Market Views

The SailPoint Blog
Three Ways Identity Security Protects Critical Infrastructure for Utilities

Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...

The Identity Management Pendulum: Identity Security Mitigates Access Management Risk

It wasn’t so long ago when it was common to think of identity management as a compliance and enablement tool for large enterprises. The market was borne from a compliance standpoint. Since then, SailPoint has led the evolution of identity into what it is today: foundational to securing and enabling today’s digital cloud enterprise. Today, a large part of the world of identi...

SailPoint Achieves ServiceNow Built on Now Platform Status

Over the last several months, we’ve seen years-long digital transformation initiatives accelerated into days and weeks to adapt to a new virtual workforce. As a result, managing user access requirements have grown exponentially and even more complex. Keeping up with these access demands while maintaining security and compliance can be overwhelming for your IT teams. This c...

State Governments Rely on SailPoint to Address Top Priorities

NASCIO recently released their top priorities for 2021. The NASCIO list is formed by a survey of its membership, whom it asks to prioritize the top issues they face. This year’s results we noticed a few shifts in the top priorities but many that stayed the same from the previous year. The priorities that were added or shifted are no doubt a result of the pandemic and subseq...

Protecting Today’s Corporate Digital Identity with Identity Security

Today we try to safeguard our digital identity as much as our wallet and its contents. Our personal digital identity authorizes us to go about our day-to-day—logging into our bank account to pay bills, checking our Facebook page for notifications or scheduling an UberEats delivery for dinner —but then there is our professional digital identity. This version of us authentica...

Why Working from Home Opened a Cybersecurity Pandora’s Box

Working from home means different things to different people. Almost by all, it’s considered a privilege made possible by technology. For some, it’s considered to be a bit of a challenge (at times) if you also have family members working from home or children (in my case, a five-month-old puppy). And for everyone, it’s considered a Pandora’s box for cybersecurity. Pandora’...

The Identity Lightbulb Moment

One of the things I run into a lot when talking with customers and prospects is this notion that identity governance is a project, a point-in-time initiative that fits in between a whole host of other IT priorities meant to support and match the velocity of the business. But let me be clear: identity governance is not and should not be considered a project. It’s a business...

Identity Governance is Business Essential

This year the pivot to virtual work happened practically overnight. It was unprecedented and it was mandatory. It was also enlightening. Join our CEO Mark McClain and CRO Matt Mills as they discuss how the past few months have revealed the critical role identity plays in securing your digital business. Watch the full talk here, including a discussion with a SailPoint custom...

The Changing Landscape of Supply Chain Management in the Wake of COVID-19

The impacts of COVID-19 on business operations and the economy is complex and continuing to evolve. To better understand what we are facing today, we will first look at a few principles and trends from the 1950s and how they are forcing organizations to rethink their operations. We will dive into some of the potential short- and long-term impacts on consumers and the import...

What Identity Governance is (Not)

I often catch articles in my newsfeed that are supposedly about identity governance, but upon reading the fine print, they invariably wind up being about access management. These articles are all missing the bigger picture – access management is essentially the ‘badge reader’ of identity, the granting of access to the proverbial building. But access is just the beginning, a...