Market Views

The SailPoint Blog
Finding the Needles (Shadow IT) in the Haystack

Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications. Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x...

Correlated Identities from IDN within CAM

Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before the accelerated growth of cloud adoption. The complexities of how cloud ...

Can You Prevent Access Risks Before They Happen?

Authored by Alex Gambill Preventing access risks is like building defenses for a castle. There are ramparts that form a perimeter and a moat to deter invaders because it’s a lot easier to keep enemies out than to remove them once they’re in. Trying to rid a system of risks after threats have been detected is analogous to building a moat around a castle after the enemy is i...

What if Identity Security and Access Management Didn’t Exist?

Authored by Karen Kelvie, Partner Marketing at Thales, and Taylor Wiggins, Product Marketing Manager – Technology Alliance at SailPoint In the world of tech, we love to future gaze. But while imagining potential new developments is exciting, it can be equally helpful to think about the reverse: How would things be different if certain technologies didn’t exist? For exampl...

SailPoint Selected for NIST Zero Trust Implementation Project to Mitigate National Cybersecurity Risk

Authored by Frank Briguglio, CISSP | SailPoint Public Sector Strategist Digital transformation and IT modernization are increasing the adoption of cloud data and applications at a pace never seen before. Now, our borders are open to remote users and non-traditional mission partners, which have dissolved traditional network boundaries rendering them ineffective. Today, to b...

No Time to Spy: GCHQ Issues Its 10 Steps to Cyber Security

Authored by Stephen Bradford, SVP EMEA, SailPoint It was in GoldenEye that ‘M’ (a very modern incarnation played by Judi Dench), derided Bond as a ‘relic of the Cold War’ and a ‘dinosaur.’ Her sobriquet of Bond is likely something he wore with pride but let’s face it—the Bond incarnations of Connery, Moore, Lazenby, and Craig have not kept up with their computer skills. T...

Questions are Free: Identity Compromised

On this episode of Mistaken Identity, Mike Kiser is joined by Katherine Teitler, VP of Research and Advisory at TAG Cyber. Her recent research illustrates the shifting role of identity—from an IT process to a foundational approach for security. While that’s the starting point, the conversation roams into disinformation, “sources of truth,” identity profiling via personal mu...

Identity Security: Three Big Opportunities for Utility Providers

Authored by: Casey Herman, PwC Partner, ESG Leader; Brad Bauch, PwC Principal, Advisory; and David Manks, SailPoint Technology Alliances & Partner Marketing If there was any doubt about the importance of cybersecurity in the utility industry, one needs simply to look at the recent news. Already this year, there have been two major breaking stories: In May, a cyberattack sh...

Friday Quick-Take: Get the Scoop on SailPoint’s Leadership in the Latest Industry Analyst Report on Identity Governance and Administration (IGA)

It’s undeniable, the world has seen some major changes over the past year. Many of these changes have directly affected enterprises’ security needs. As the world evolves, SailPoint continues to display a strong understanding of existing and emerging challenges across the security landscape solidifying its position as the overall market leader in KuppingerCole’s 2021 Leaders...

Three Ways to Improve Healthcare Compliance and Innovation with Identity Security

Authored by: Matthew Radcliffe Did you know there were more than 29 million healthcare records breached in 2020, and the second-leading cause of those breaches was unauthorized access?[1] If the last year has taught us anything, it’s that life can be unpredictable and sometimes we are forced to change — rapidly. So how does one of the most regulated industries embrace gro...