The Identity Blog

The SailPoint Blog
Vodafone Turkey Strengthens Their IAM Program with SailPoint

Authored by Nataliia Gnatiienko, Customer Marketing Manager Vodafone operates mobile and fixed networks in 21 countries and partners with mobile networks in 48 more. As of June 2022, the company had over 300 million mobile customers, more than 28 million fixed broadband customers, and 22 million TV customers. Vodafone is a world leader in the Internet of Things (IoT), conn...

The Future of Identity Security: Four Major Elements

Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...

The Emerging Landscape of Healthcare Cyber Insurance

Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...

Flinders University Builds an Identity Program for Higher Education

Authored by Nataliia Gnatiienko, Customer Marketing Manager Flinders University is a leading international university in Australia with a record of excellence and innovation in teaching, research, and community engagement. The University was retiring its legacy identity warehouse as it was no longer supported and required substantial maintenance. Looking for a cloud-first ...

Navigate 2022: CISO-to-CISO Panel (Day 2)

Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. SailPoint’...

Navigate 2022: CISO-to-CISO Panel (Day 2)

Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. SailPoint’...

5 Resources to Develop Your Identity Security Knowledge and Network

Authored by Meredith Blanchar, Chief Customer Officer, and Denise Denson-Hanson, AVP, Community and Education There’s never been a better time to be an identity security professional! We heard again from many of our customers and partners at Navigate 2022 about the importance of developing and expanding the identity security talent pool. That’s why at SailPoint, we are on ...

Navigate 2022: The Customer Identity Panel

Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: Identity as a Digital Transformation Accelerant proved to be an engaging blend of organizations at various stages of their identity management programs earlier this month during our annual conference. SailPoint’s Chief Customer Officer, Meredith Blanchar, set the table for this session by ...

Pick n Pay and SailPoint – Growing Together in a Co-Innovative Partnership

Authored by Nataliia Gnatiienko, Customer Marketing Manager Pick n Pay, a prominent African retailer, strives to address socio-economic challenges by supplying high-quality, affordable food for all customers while providing employment and economic opportunities across its value chain. The company used to run manual access requests in their legacy identity solution, which t...

Rethinking the Identity Security Paradigm: Three Ways to Stay Ahead of Identity-related Threats

Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...