Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...
The Identity Blog
Authored by Jerry Aubel, Senior Product Marketing Manager Automation is an important key to a more efficient Identity Security program. One where you can concentrate more on execution and less on building manual processes. That’s why we are excited to talk to you about SailPoint Identity Security Cloud SaaS Workflows. SaaS Workflows can automate and orchestrate less defina...
Nobel prize-winning author John Steinbeck once said, “…to find where you are going, you must know where you are.” Having a starting point in whatever journey you are undertaking is vital as the path forward starts from there. In the case of our world, identity security for large, complex enterprises – it’s not about a distinct start and end point. It’s not one-and-done. It...
Authored by Taylor Wiggins, Global Alliances Marketing Manager at BeyondTrust We are back live and in person in Austin, TX, for SailPoint’s Navigate conference! SailPoint is celebrating 10 years at their user conference this year, and we are excited to be onsite sponsoring at a Gold Level. We look forward to sharing all the integration capabilities BeyondTrust and SailPoin...
Authored by Meredith Blanchar, Chief Customer Officer, and Denise Denson-Hanson, AVP, Community and Education Do joiner-mover-leaver events keep you up at night? Does building a role-based access control (RBAC) framework sound like fun? Do you secretly wish you had more time to play with data, AI, and access modeling? You just might be an identity security professional. An...
Authored by David Mattos, Chief Revenue Officer iC Consult/SecureITsource The digitization of organizations is advancing rapidly. Business processes and customer relationships are quickly moving to digital platforms, and managing digital identities is becoming increasingly important. David Mattos, Chief Revenue Officer iC Consult/ SecureITsource, explains why modern cloud-...
By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...
Authored by Brian Royer Navigate 2022, the must-attend identity security conference of the year, features main stage sessions with representation from SailPoint leadership and guest speakers and more than 40 information-packed breakout sessions live-streamed and made available on-demand. But how will you organize your Navigate agenda? Here are a few of the can’t-miss break...
Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...
When the pandemic took root back in 2020, companies moved to triage mode in order to rapidly become a 100% virtual workforce. The most pressing item on their list: get everyone access to everything they need to be productive on the job from home. Not only was the shift swift, it also created a significant margin for error when it came to the security of the business becaus...