What is your role in cybersecurity? Maybe you’re an expert in identity security who stays on top of the latest trends, or maybe you’re new to space and need a bit of help navigating the vast ocean of enterprise security through the lens of identity. Whoever you are, SailPoint’s premier identity conference Navigate 2022, is for you! The identity security event of the year is...
Market Views
Authored by Jerry Aubel, Senior Product Manager “Audit time and the living is easy!” I suspect the thought of the following access certification review doesn’t have you whistling down the hall, but it doesn’t have to be a burden. User access certification is a critical process for any enterprise. Automating it can make it easy for Identity teams and the business to meet re...
Automation is key to scaling identity security. With so much data, there are not enough experts and resources to keep up with and keep track of every intertwining workstream and application that cross different identities. It has moved far beyond human capacity at this point. At SailPoint, automation is one of the core pillars of our products. We aim to free up time so our ...
It surprises me that in today’s digitally accelerated world, many organizations are still trying to manage and secure their identities with manual processes – using older means like spreadsheets, for example – which is nearly impossible. According to our recent survey, 55% of companies still rely on manual processes to adjust user access when IT environments change. This op...
There is enormous potential among global enterprises today as their organization rapidly transform and evolve to take advantage of new business opportunities, emerging technologies, and entirely new ways of working. And because of that, identity security has emerged as the talk of the enterprise security industry. It has become THE foundation for secure digital transformat...
As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...
Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...
Today is World Password Day – the perfect opportunity to ensure we are doing all we can to manage our online logins. Passwords are a key to our digital identity. They allow us to bank, shop, work, and socialize online, but they also protect us. Strong, complex passwords ensure all the information we store online is protected, which is essential for our privacy and security....
Security professionals, identity managers, and IT operations teams are under growing pressure to make fast decisions based on a nonstop flow of alerts, reports, and initiatives to both enable and protect the business. According to a recent cloud security report1, 59% of surveyed IT professionals say they receive more than 500 public cloud security alerts per day; 38% receiv...
There has never been a more challenging time managing cyber risk and responding to the challenges of an ever-changing business landscape than today. A recent Forrester report investigated new challenges modern enterprises face, like: A sharp increase in the number of remote workers and non-employee workers More types of users, non-human entities, devices, and data sources...