Authored by Christopher Caruso, VP, Customer Success I have a fervent belief that in the software business, customers choose SailPoint as a vendor based on the value we create, the efficiency we identify and the speed of execution we add to our customers’ value chain (I’ll leave that for a later blog post!). However, a major factor in why customers choose to STAY with us i...
Customer Stories
Security leaders share their experiences overcoming roadblocks and building a solid business case for identity security Identity security is a critical part of the dynamic digital landscape and is essential for risk mitigation, compliance, and operational efficiency. It’s an enabling technology that provides greater security for organizational resources and a foundation ...
Companies of all sizes are leveraging identity security capabilities in new ways to address more business challenges than ever before. To gain an on-the-ground perspective on how large companies are succeeding with identity and what they’re learning from their deployments, SailPoint CEO, Mark McClain sat down with Cody Warhurst, Director of Identity and Access Management at...
Authored by Chris Gossett, SVP, Technology Services On-premises solutions can give you control of all your infrastructure and the power to customize your configurations. While powerful, on-premises solutions have their limits and can impact budgets, resource consumption, availability, scalability, and more. For example, organizations may struggle to find appropriate staff ...
For many organizations, the cloud is the future. As applications, databases, and services shift to cloud platforms, it means security must also. Luckily, any organization already invested in SailPoint IdentityIQ on-premises identity management solutions has a head start. They can migrate almost seamlessly to SailPoint Identity Security Cloud, maintaining work already done ...
The Federal Risk and Authorization Management Program (FedRAMP) is a U.S. government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP authorization process is designed to ensure that cloud services used by federal agencies meet the government’s stringent security...
What good is the strongest door lock if all the windows in your house are unlocked and not monitored? Unfortunately, that’s the situation for too many organizations when it comes to lifecyle management and risk management of non-employees. For example, a recent PwC Survey found that only 40% of survey respondents say they thoroughly understand the risk of data breaches thr...
Software-as-a-service (SaaS) solutions can be a huge improvement over traditional IT solutions in many ways, from cost and scalability to easier deployment and maintenance. Those benefits (and others) are helping to drive rapid growth in the SaaS market, which is projected by Gartner to top 16% in 2023. But with that growth of SaaS services in the enterprise also comes som...
Managing cyber security for an organization is an ongoing process that evolves as an organization’s infrastructure, applications, technology, and user base evolves. For many organizations, cloud is an important part of that evolution. Some organizations have gone fully to the cloud with applications and data; others are still wholly on-premises, while many others are somew...
Most companies do not doubt that implementing identity and access governance in their organization might be a good idea. But what’s the best way to do it? By following the advice of those who have gone before. Specifically, at Navigate 2022 in London, IT leaders from various industries recently shared their best practices for initiating an identity and access governance pr...