Market Views

The SailPoint Blog
Shared Signals, and thanks for all the fish

“In fact there was only one species on the planet more intelligent than dolphins” - Douglas Adams, Hitchhiker’s Guide to the Galaxy Identity security could learn a lot from dolphins—not only are they smart, but they’re playful, energetic, and creative. But one characteristic stands out above the rest: dolphins are cooperative. Throughout the world, there are no fewer than...

Collaboration for the greater good: The SailPoint ecosystem

The importance of a collaborative ecosystem To thrive in the fast-paced digital world, organizations operate in a networked system to offer the right product and service to the right customers in the right market at the right time. SailPoint understands the importance of this healthy ecosystem and the value it brings to our partners, developers, and customers.   At SailPo...

Introducing SailPoint Identity Security for SAP: Solutions for transformation

Organizations are concerned about the security of unauthorized system and application access as they transition from legacy systems like on-premises SAP ECC to S/4HANA and SAP cloud applications and ecosystems. Enterprises also may be in search of alternative identity security solutions that can support SAP applications, especially with SAP Identity Management (IdM) moving...

The silent security threat: Why machine identities are your biggest blind spot

In today’s hyper-connected world, businesses rely on a growing number of non-human accounts—service accounts, bots/RPAs, and other non-human accounts—to drive their operations. But what happens when managing these machine identities becomes more complex than anticipated? A recent survey, sponsored by SailPoint and conducted by Dimensional Research, sheds light on the challe...

Shaping the future of identity security: What’s new with SailPoint Identity Security Cloud

As we near the end of 2024, it’s time to think about what the future will bring and take stock of what’s working and what needs attention. At SailPoint, we’re constantly thinking about how to innovate and enhance Identity Security Cloud with new capabilities to deliver what we believe will provide the most value to our customers.Many organizations are facing trends such as ...

Introducing SailPoint Privileged Task Automation: Secure and scalable automation for repeatable privileged tasks

To keep organizations running smoothly, IT operations teams must execute many maintenance tasks that require privileged credentials, which unlock access to critical assets. While some ad-hoc tasks require expert knowledge and specialized skills, many involve routine, repetitive, and manual work. The single-team approach to task execution, paired with an ever-growing list of...

Why are many businesses turning to third-party security partners?

Author: David Schwartz, SVP, Global Partners In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been forced to scale back their cybersecurity programs as they struggle to find experienced candidates to fill vital positions—but even as they do so, threat acto...

How to get community-based developer support when building your unique identity security program

This summer, the SailPoint Developer Relations team attended DevRelCon in New York City. The technical community is an important audience for SailPoint, and we are dedicated to providing access to the tools and resources developers need to successfully extend SailPoint solutions for their unique and complex use cases. We also facilitate peer engagement so that idea sharing ...

Navigate 2024 agenda unveiled: Transform your identity security journey

Spoiler: The full agenda for SailPoint Navigate 2024 is now live! Identity is one of the most leveraged threat vectors for accessing applications and data—and it’s constantly evolving. What is an “identity”? What defines “access”? How do you manage and secure at speed and scale? None of these questions have simple answers. That is why identity security has to transform to...

New research: key trends in compliance, emergency access risks, and automation

Author: Eric Zimmerman, Product Marketing Manager While many organizations are shifting to a unified identity security approach to improve compliance and proactively mitigate risk, few companies have fully arrived. To help understand some of the most pressing governance, risk, and compliance challenges – especially those related to separation of duties, also called segreg...