“This is one of the most impressive projects that I’ve seen in a very long time. Replacing Oracle and successfully migrating to a modern Identity platform is no small feat, but PG&E, Integral and SailPoint worked as a team.” – Harry Gould, Senior Vice President of Worldwide Alliances and Channels, SailPoint Pacific Gas and Electric Company (PG&E) is one of the largest comb...
Market Views
What is Identity Security? You’ve heard the phrase, read long jargony articles about it, but you still aren’t quite clear on what it means. You’re in luck! Below we described identity security in 11 bite-sized tweets. Identity security (also known as identity governance and identity management) protects against cyber threats associated with providing technology access to a...
At SailPoint, we know that it’s important to love what you do, and love where you do it. If you’re interested in joining a company where you have an impact and can challenge yourself, check out our SaaS engineering and DevOps openings. Cybersecurity is one of the hottest sectors today, with new threats, technology and challenges emerging each day. And with that, there is a...
Authored by Frank Briguglio, CISSP – Public Sector Strategist, SailPoint There’s been a lot of movement from officials to shore up the U.S. government’s security posture. In early September, the Office of Management and Budget (OMB) published the draft strategy “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles” to identify critical security prioritie...
Pop the Waterloo sparkling water (we are big fans at the SailPoint HQ) or the real-deal bubbles, depending on what part of the world you are in, because we are celebrating this week! Recently, the SailPoint Crew (if you’re new here, that is what we like to call ourselves) was named Overall Leader in KuppingerCole’s Leadership Compass Identity as a Service-Identity Governanc...
Authored by Gary Savarino, Identity Strategist APAC Identity is not a new concept. Since the invention of the ‘digital identity,’ organizations have been tackling the challenges of identity with various approaches for decades. Identity capabilities, often generically categorized as Identity and Access Management (IAM) or Identity Management (IDM), represent multiple disti...
Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications. Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x...
Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before the accelerated growth of cloud adoption. The complexities of how cloud ...
Authored by Alex Gambill Preventing access risks is like building defenses for a castle. There are ramparts that form a perimeter and a moat to deter invaders because it’s a lot easier to keep enemies out than to remove them once they’re in. Trying to rid a system of risks after threats have been detected is analogous to building a moat around a castle after the enemy is i...
Authored by Karen Kelvie, Partner Marketing at Thales, and Taylor Wiggins, Product Marketing Manager – Technology Alliance at SailPoint In the world of tech, we love to future gaze. But while imagining potential new developments is exciting, it can be equally helpful to think about the reverse: How would things be different if certain technologies didn’t exist? For exampl...