“In fact there was only one species on the planet more intelligent than dolphins” - Douglas Adams, Hitchhiker’s Guide to the Galaxy Identity security could learn a lot from dolphins—not only are they smart, but they’re playful, energetic, and creative. But one characteristic stands out above the rest: dolphins are cooperative. Throughout the world, there are no fewer than...
Market Views
The importance of a collaborative ecosystem To thrive in the fast-paced digital world, organizations operate in a networked system to offer the right product and service to the right customers in the right market at the right time. SailPoint understands the importance of this healthy ecosystem and the value it brings to our partners, developers, and customers. At SailPo...
Organizations are concerned about the security of unauthorized system and application access as they transition from legacy systems like on-premises SAP ECC to S/4HANA and SAP cloud applications and ecosystems. Enterprises also may be in search of alternative identity security solutions that can support SAP applications, especially with SAP Identity Management (IdM) moving...
In today’s hyper-connected world, businesses rely on a growing number of non-human accounts—service accounts, bots/RPAs, and other non-human accounts—to drive their operations. But what happens when managing these machine identities becomes more complex than anticipated? A recent survey, sponsored by SailPoint and conducted by Dimensional Research, sheds light on the challe...
As we near the end of 2024, it’s time to think about what the future will bring and take stock of what’s working and what needs attention. At SailPoint, we’re constantly thinking about how to innovate and enhance Identity Security Cloud with new capabilities to deliver what we believe will provide the most value to our customers.Many organizations are facing trends such as ...
To keep organizations running smoothly, IT operations teams must execute many maintenance tasks that require privileged credentials, which unlock access to critical assets. While some ad-hoc tasks require expert knowledge and specialized skills, many involve routine, repetitive, and manual work. The single-team approach to task execution, paired with an ever-growing list of...
Author: David Schwartz, SVP, Global Partners In 2023, 71% of organizations across various industries reported that their business feels the impact of the ongoing cybersecurity skills shortage. Many companies have been forced to scale back their cybersecurity programs as they struggle to find experienced candidates to fill vital positions—but even as they do so, threat acto...
This summer, the SailPoint Developer Relations team attended DevRelCon in New York City. The technical community is an important audience for SailPoint, and we are dedicated to providing access to the tools and resources developers need to successfully extend SailPoint solutions for their unique and complex use cases. We also facilitate peer engagement so that idea sharing ...
Spoiler: The full agenda for SailPoint Navigate 2024 is now live! Identity is one of the most leveraged threat vectors for accessing applications and data—and it’s constantly evolving. What is an “identity”? What defines “access”? How do you manage and secure at speed and scale? None of these questions have simple answers. That is why identity security has to transform to...
Author: Eric Zimmerman, Product Marketing Manager While many organizations are shifting to a unified identity security approach to improve compliance and proactively mitigate risk, few companies have fully arrived. To help understand some of the most pressing governance, risk, and compliance challenges – especially those related to separation of duties, also called segreg...