Market Views

The SailPoint Blog
Identity Outliers – Discover & Remediate Anomalous Identities

What if you could discover risky identities within an organization as easily as you search for your next favorite song on Spotify? Leverage SailPoint’s security expertise to surface Outlier identities. Press “remediate” or “ignore” to train the AI/ML to adapt to your organization’s unique security preferences. The music industry was revolutionized by the advent of AI/ML. W...

How Our New Product Suites Are Setting the Standard for Identity Security

People tend to want what they need. This is as true for technology solutions as it is for everything else. But while the truism may sound simple in theory, the unfortunate truth is that people don’t always know what they need. Often, customers need to see for themselves the positive outcomes that stem from implementing a solution before they understand why it is necessary. ...

Identity Security: The Foundation of a Successful Cybersecurity Strategy

Identity has transformed from a back-office function to becoming one of the most critical components of a company’s transformation strategy. But how can your company adapt if you do not know who has access to what systems, how they got that access, whether it is still relevant, and what they are doing with that access? Companies need a comprehensive intelligent identity pl...

Identity Security, SpaceX, Ephemeral Entitlements, and Data

It’s a time-worn adage: “What goes up must come down.” This took on a new meaning this past winter. On February 3, 2022, SpaceX launched 49 Starlink satellites. A day later, they were hit by a geomagnetic storm. By February 8th, SpaceX reported that 40 of the original 49 would reenter the Earth’s atmosphere and disintegrate, or they would soon. These precious resources last...

The Core Components of Identity Security

Over the last few months, organizations have seen a shift in managing and securing identities, and it has moved well beyond human capacity. In order to do this effectively, organizations need artificial intelligence and machine learning at the core of their identity solution to automate the discovery, management, and control of all user access throughout their digital life ...

Data Privacy Day 101

Data Privacy Day (known in Europe as Data Protection Day) is an international event that occurs every year on January 28. The purpose of the day is to raise awareness about how businesses and individuals can promote privacy and data protection best practices. But where did Data Privacy Day come from and how can you celebrate and protect yourself? We get into the 101 below. ...

Get Familiar with the Cyber Basics

At a time when the majority of our life happens behind a screen, being “cyber smart” is more important than ever. After all, this year has already seen more than a fair share of attacks and breaches, and cyberattacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks an...

How Well Can You Protect Your AWS Cloud?

Moving critical workloads to Amazon Web Services (AWS) means significant cost savings and real productivity increases for your organization. The number of recent cybersecurity incidents involving external cloud assets has nearly tripled.1 Maximizing the benefits of AWS is important, but not at the expense of allowing your organization to be exposed to increased risk. Cyber...

Friday Quick-Take: What to Know About SailPoint’s Position in The Forrester Wave™: Identity Management and Governance, Q4 2021

Tic-tac-toe, three in a row! SailPoint was named a leader in The Forrester Wave™: Identity Management and Governance, Q4 2021, for the third year in a row. 🎉 At SailPoint, we take what we do very seriously, so you can bet we are beyond proud to be named a leader. We also believe in taking the time to celebrate big wins [pause for celebratory dance]. Now that we’ve gotten t...

What Greek Mythology Can Teach Us About Present-Day Cybersecurity

The cybersecurity Pandora’s Box is still open, and it shows no signs of shutting down when it comes to our present-day digital posture. Last year, we found how the forced transition to remote work opened security and compliance gaps, effectively opening a cybersecurity Pandora’s Box. Presently, many enterprises are still grappling with the aftereffects of a hybrid workforc...