Market Views

The SailPoint Blog
2022’s Best (Blog) Hits

It’s that time of year: time for reflection and goal setting. Some big things happened in 2022! We learned a lot and continued to refine our products to help us protect enterprises for the future. In case you missed one (or more), check out our top-performing blogs and take an insight or two to help you strengthen your security program in 2023 and beyond. 1. Welcome to ...

The Future of Identity Security: Four Major Elements

Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...

The Emerging Landscape of Healthcare Cyber Insurance

Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...

Navigate 2022: CISO-to-CISO Panel (Day 2)

Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. SailPoint’...

Navigate 2022: CISO-to-CISO Panel (Day 2)

Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. SailPoint’...

Rethinking the Identity Security Paradigm: Three Ways to Stay Ahead of Identity-related Threats

Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...

Emergency Access Management: Manage Critical Security Measures with Ease

Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...

SaaS Workflows: Re-think Automation with SailPoint Identity Security Cloud

Authored by Jerry Aubel, Senior Product Marketing Manager Automation is an important key to a more efficient Identity Security program. One where you can concentrate more on execution and less on building manual processes. That’s why we are excited to talk to you about SailPoint Identity Security Cloud SaaS Workflows. SaaS Workflows can automate and orchestrate less defina...

The Horizons of Identity Security

Nobel prize-winning author John Steinbeck once said, “…to find where you are going, you must know where you are.” Having a starting point in whatever journey you are undertaking is vital as the path forward starts from there. In the case of our world, identity security for large, complex enterprises – it’s not about a distinct start and end point. It’s not one-and-done. It...

Mature Your IGA Solution with a Role-Based Framework

By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...