Market Views

The SailPoint Blog
Get the Most Out of Access Request

Self-Service Access Request is one example of a way that organizations enable new and seasoned employees so they can get the access they require to get their jobs done. The concept sounds simple, right? Give users a catalog of items to choose from, allow them to submit requests, and carry the request through necessary reviewers before granting the access. We have found tha...

Three Questions with Gina Miller, Reference Program Manager at SailPoint

Gina Miller may be a new SailPoint crew member, but she is right at home. Like many of us, her career path was less of a straight line and more of a winding, scenic road. Let’s break it down real quick – she studied economics and planned to go into finance but instead found herself in the start-up life. That unexpected turn gave her the chance to wear many hats – one of whi...

What Greek Mythology Can Teach Us About Access Modeling

For fans of Greek mythology, the story of Sisyphus is a bleak example of one assigned to a life of unending, monotonous tasks. Sisyphus ran afoul of Zeus one too many times and was assigned the grueling punishment of forever rolling a massive boulder up a hill. Every time Sisyphus rolled the boulder up the hill, it would roll down, every day, until the end of time. Does t...

Embed Identity Security with SailPoint’s Open, Extensible SaaS Platform

The global pandemic turned the world upside down with a new normal. Just look at the digital transformation. What might have taken five to 10 years before COVID-19 is happening right now in the blink of an eye. With many of us working remotely, technology-driven transformation is now front and center, driving an exponential proliferation of cloud applications as well as cyb...

Three Ways Identity Security Protects Critical Infrastructure for Utilities

Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...

The Identity Management Pendulum: Identity Security Mitigates Access Management Risk

It wasn’t so long ago when it was common to think of identity management as a compliance and enablement tool for large enterprises. The market was borne from a compliance standpoint. Since then, SailPoint has led the evolution of identity into what it is today: foundational to securing and enabling today’s digital cloud enterprise. Today, a large part of the world of identi...

SailPoint Achieves ServiceNow Built on Now Platform Status

Over the last several months, we’ve seen years-long digital transformation initiatives accelerated into days and weeks to adapt to a new virtual workforce. As a result, managing user access requirements have grown exponentially and even more complex. Keeping up with these access demands while maintaining security and compliance can be overwhelming for your IT teams. This c...

State Governments Rely on SailPoint to Address Top Priorities

NASCIO recently released their top priorities for 2021. The NASCIO list is formed by a survey of its membership, whom it asks to prioritize the top issues they face. This year’s results we noticed a few shifts in the top priorities but many that stayed the same from the previous year. The priorities that were added or shifted are no doubt a result of the pandemic and subseq...

Protecting Today’s Corporate Digital Identity with Identity Security

Today we try to safeguard our digital identity as much as our wallet and its contents. Our personal digital identity authorizes us to go about our day-to-day—logging into our bank account to pay bills, checking our Facebook page for notifications or scheduling an UberEats delivery for dinner —but then there is our professional digital identity. This version of us authentica...

Why Working from Home Opened a Cybersecurity Pandora’s Box

Working from home means different things to different people. Almost by all, it’s considered a privilege made possible by technology. For some, it’s considered to be a bit of a challenge (at times) if you also have family members working from home or children (in my case, a five-month-old puppy). And for everyone, it’s considered a Pandora’s box for cybersecurity. Pandora’...