Author: Eric Zimmerman, Product Marketing Manager While many organizations are shifting to a unified identity security approach to improve compliance and proactively mitigate risk, few companies have fully arrived. To help understand some of the most pressing governance, risk, and compliance challenges – especially those related to separation of duties, also called segreg...
Market Views
Author: Jody Paterson, Sr. Director, Technology Alliances The development, implementation and maintenance of SAP applications ranks as one of the most critical and ongoing IT investments for today’s enterprises. SAP’s introduction of cloud-based S/4HANA as a replacement for on-premises SAP ERP Central Component (SAP ECC) and the company’s expanded focus on cloud-based app...
Author: Alex Leemon, Director, Product Marketing Identity security has emerged as a fundamental pillar of enterprise information security. This shift has been driven by the growing recognition that identities, whether human or machine, are often the primary targets for cyber attackers. While human identities have long been a focus, securing machine identities—such as appli...
Identity security is at the core of modern security today. With threats to applications and sensitive data greater than ever, how can enterprise security leaders establish a stronger, more resilient enterprise security program and keep their companies safe? SailPoint’s live virtual event, IdentityTV, featured expert insights on what’s driving the identity landscape today, a...
The SailPoint crew has had a busy summer! We kicked off the season with several product updates. We announced new Data Access Security and Non-Employee Risk Management capabilities within the SailPoint Identity Security Cloud, offering our customers better visibility, efficiency, and security. Additionally, we launched our new AI-powered application onboarding capability t...
On 4 March 2024 at Gartner’s UK Identity & Access Management Summit, Simon Langley, ASDA’s Chief Information Security Officer (CISO) joined Steve Bradford, SailPoint Senior Vice President (SVP) on stage for a discussion around how to successfully implement a strong identity security program. In an engaging Q&A, Simon shares how his team matched the pace and velocity of a c...
Author: Eric Zimmerman, Product Marketing Manager In today’s data-driven landscape, modern enterprises depend on their business data to boost productivity and drive innovation. From AI initiatives to business intelligence, having the right access to the right information is crucial for data-backed decision-making. But what happens when organizations lack full visibility o...
Understanding and satisfying identity security requirements is about helping organizations not only secure access to environments, but also realize business value as quickly as possible. And the first step is to secure access to applications. When organizations don’t apply core identity security principles – such as access requests, access approvals, certifications, and in...
SailPoint application onboarding: AI-powered lifecycle management for enterprise applications The first step to identity security success is securing access to the applications enterprises use every day. The sooner enterprises can identify ungoverned applications and implement right time-right access controls for each identity, the sooner they can realize value from importa...
Author: Ryan Cooney, Manager, Compliance Federal Program Management Government agencies, critical infrastructure, and government contractors seeking a SaaS-based identity security solution must choose a FedRAMP-authorized cloud service provider (CSP) they can trust to advance their identity security program. We sat down with Ryan Cooney, Manager of Federal Security Complia...