Technology and identities are inseparable today. This inseparable connection lies at the heart of today’s modern enterprise. It drives digital transformation. It fuels business innovation. It enables the business to stay competitive. These connections are crucial to the success of the business and transformation efforts. They also represent a tremendous attack surface. The...
The Identity Blog
It surprises me that in today’s digitally accelerated world, many organizations are still trying to manage and secure their identities with manual processes – using older means like spreadsheets, for example – which is nearly impossible. According to our recent survey, 55% of companies still rely on manual processes to adjust user access when IT environments change. This op...
Authored by Tina Duong, Senior Product Manager As Dick Clark once said, “Music is the soundtrack of your life.” Music helps me sit through the horrendous rush hour traffic in Los Angeles. It pumps my friends and me up before a concert or, on my own, allows me to pretend I am starring in a sad music video in the pouring rain. Music calms me when I am taking a long drive alo...
There is enormous potential among global enterprises today as their organization rapidly transform and evolve to take advantage of new business opportunities, emerging technologies, and entirely new ways of working. And because of that, identity security has emerged as the talk of the enterprise security industry. It has become THE foundation for secure digital transformat...
As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...
From video game consoles to education platforms, Adeline Chew, Engineering Manager, has had an eventful journey to identity security. In this Women in Identity blog, Adeline details her path to cybersecurity and shares how becoming a manager has been the most significant learning moment for her. How did you come to your identity security career? It has been a very long jo...
Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...
Authored by Ashley Gogna Quote by Adam Grant Identity and Core Values I’m someone who thrives on change – I know you’re judging me but hear me out on this. My career path consists of a diverse background in sales and leadership across industries – and although I was in technology sales prior to joining SailPoint, I didn’t have a background in Identity. I allowed myself ...
Authored by Eric Zimmerman, Product Marketing Manager VUCA world? Yes, you read that right. VUCA: Volatility, uncertainty, complexity, and ambiguity. It’s a concept that originated with students at the U.S. Army War College to describe the world after the Cold War. The idea was further popularized in 1987 through the leadership theories of Warren Bennis and Burt Nanu. They...
Today is World Password Day – the perfect opportunity to ensure we are doing all we can to manage our online logins. Passwords are a key to our digital identity. They allow us to bank, shop, work, and socialize online, but they also protect us. Strong, complex passwords ensure all the information we store online is protected, which is essential for our privacy and security....