In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration in a trend that we saw percolating within the enterprise for the last handful of years: digital transformat...
Market Views
Today, healthcare organizations manage a wide range of identities beyond employees. Contractors, affiliate physicians, travel nurses, flex nurses, and medical students make up a large percentage of their workforce and manually reviewing and granting access can be error-prone and extremely time-consuming. However, automating secure access and simplifying onboarding can bring...
Like many things in life, modern identity security solutions are a delicate balance — providing fast, secure, and convenient access to resources for those who need them while ensuring the highest level of security so they can move with speed, agility, and minimal risk. To help organizations achieve this balance on their identity journey, we recently published Identity secu...
Pop quiz: what industries aren’t being attacked by bad actors? Answer: none. But state, local, education (SLED) agencies are especially under attack due to expanding hybrid workforces, high-risk excess entitlements, manual processes, and staffing shortages. Agencies need to efficiently control access to all applications, systems, and sensitive citizen data. But most don’...
Providing fast, accurate access to digital resources for those who need it is essential for organizations to secure their business and gain a competitive edge. Yet enterprises are facing unprecedented security challenges with more sophisticated cyber threats and growing privacy regulations. To help organizations on their identity journey, SailPoint recently published Ident...
Authored by Michael Conti, Product Marketing Manager In true SailPoint fashion, we are always hungry to learn more. More about new technologies, security threats, market needs — the list goes on. So, we recently conducted a global survey of security & IT professionals and executives to better understand how companies manage non-employee and non-human identities and their r...
The term “legacy” is thrown around a lot in this industry. The immediate connotation is negative — the implication is that your technology is outdated, stagnant, and replaceable. And certainly, there is a short list of vendors in identity who are very much “legacy” in the traditional sense. They’ve given up on innovation. They no longer invest in that area of their busines...
The high temperatures here in Austin have been hovering at 105F / 41C for a week or two, meaning that the simple invention of air conditioning shifts from a “nice to have” to a “must have.” The irony is that despite being an essential component of houses and businesses HVAC systems are often ignored until they break down. And once the heat starts climbing, air conditioning ...
CISOs have one of the most challenging jobs today. Not only are they tasked with creating policy that keeps their companies safe, but they are also in charge of executing that plan which often proves to be an even bigger challenge. Why? I’ll admit one reason is the technology component. Today’s identity security market can be quite confusing, especially to a new or unsophis...
Authored by Jerry Aubel, Senior Product Marketing Manager Think fast: what’s the most critical element of a robust Identity and Access Management strategy? Ask any security team, and I’ll wager that their answers will be all over the map. One key element that’s sometimes overlooked is password management. But take a closer look, and you’ll likely agree it’s a critical cap...