The Identity Blog

The SailPoint Blog
Women in Identity Security: Vicki Sainz

From physical therapy to bookkeeping to AI, Vicki Sainz, Staff QA Engineer, has had an eventful journey to identity security. In this blog, Vicki details her path to AI and shares how SailPoint’s culture has provided her with the tools for success. How did you come to your identity security career? I came from a family where going to college was an expectation, and my fat...

Globe Telecom: Identity Empowers a Seamless User Experience

Globe Telecom, Inc is a primary telecommunications services provider in the Philippines. The company serves consumers’ and businesses’ telecommunications and technology needs across various products and services. Supported by over 8,300 employees and over 1.1 million retailers, distributors, and business partners nationwide, the company currently has over 85 million custome...

Zero Trust and the Future of the Workplace

There has never been a more challenging time managing cyber risk and responding to the challenges of an ever-changing business landscape than today. A recent Forrester report investigated new challenges modern enterprises face, like: A sharp increase in the number of remote workers and non-employee workers More types of users, non-human entities, devices, and data sources...

Identity Management Day

Today, we celebrate Identity Management Day. What is that you might ask? Identity Management Day is about raising awareness of the importance of identity management and securing digital identities and sharing best practices to help organizations and consumers be identity smart. Identity-related breaches are ubiquitous and preventable, whether you are an individual or a For...

Identity Outliers – Discover & Remediate Anomalous Identities

What if you could discover risky identities within an organization as easily as you search for your next favorite song on Spotify? Leverage SailPoint’s security expertise to surface Outlier identities. Press “remediate” or “ignore” to train the AI/ML to adapt to your organization’s unique security preferences. The music industry was revolutionized by the advent of AI/ML. W...

How Our New Product Suites Are Setting the Standard for Identity Security

People tend to want what they need. This is as true for technology solutions as it is for everything else. But while the truism may sound simple in theory, the unfortunate truth is that people don’t always know what they need. Often, customers need to see for themselves the positive outcomes that stem from implementing a solution before they understand why it is necessary. ...

File Access Manager 8.3 Expands Reach to Include Data Privacy Governance for Unstructured Data

Today’s enterprises are facing a “perfect storm” when it comes to data privacy. Longstanding regulations like GDPR, the California Consumer Privacy Act (CCPA), and others are now imposing stricter compliance requirements around the handling of Personally Identifiable Information (PII). At the same time, the current processes required to handle these privacy-related request...

Quality Travel Automated by Friends

I have been fortunate to have traveled to several countries outside of the United States. One of the best ways to travel is to meet a friend in a new location and leverage their local knowledge to navigate the terrain effectively. TripAdvisor and Yelp don’t stand a chance against a good friend who can easily traverse local customs, find the best historical sites, and point ...

World Backup Day

It seems that there is a holiday for everything now, including the identity security industry. From Day of the Programmer to Data Privacy Day, the cyber world takes a chance to celebrate and educate audiences about the crucial things surrounding cybersecurity and much more. So, it’s no surprise that we celebrate World Backup Day today. So, first question: What is a backup?...

Identity Security: The Foundation of a Successful Cybersecurity Strategy

Identity has transformed from a back-office function to becoming one of the most critical components of a company’s transformation strategy. But how can your company adapt if you do not know who has access to what systems, how they got that access, whether it is still relevant, and what they are doing with that access? Companies need a comprehensive intelligent identity pl...