The Identity Blog

The SailPoint Blog
Zero Trust and the Future of the Workplace

There has never been a more challenging time managing cyber risk and responding to the challenges of an ever-changing business landscape than today. A recent Forrester report investigated new challenges modern enterprises face, like: A sharp increase in the number of remote workers and non-employee workers More types of users, non-human entities, devices, and data sources...

Identity Management Day

Today, we celebrate Identity Management Day. What is that you might ask? Identity Management Day is about raising awareness of the importance of identity management and securing digital identities and sharing best practices to help organizations and consumers be identity smart. Identity-related breaches are ubiquitous and preventable, whether you are an individual or a For...

Identity Outliers – Discover & Remediate Anomalous Identities

What if you could discover risky identities within an organization as easily as you search for your next favorite song on Spotify? Leverage SailPoint’s security expertise to surface Outlier identities. Press “remediate” or “ignore” to train the AI/ML to adapt to your organization’s unique security preferences. The music industry was revolutionized by the advent of AI/ML. W...

How Our New Product Suites Are Setting the Standard for Identity Security

People tend to want what they need. This is as true for technology solutions as it is for everything else. But while the truism may sound simple in theory, the unfortunate truth is that people don’t always know what they need. Often, customers need to see for themselves the positive outcomes that stem from implementing a solution before they understand why it is necessary. ...

File Access Manager 8.3 Expands Reach to Include Data Privacy Governance for Unstructured Data

Today’s enterprises are facing a “perfect storm” when it comes to data privacy. Longstanding regulations like GDPR, the California Consumer Privacy Act (CCPA), and others are now imposing stricter compliance requirements around the handling of Personally Identifiable Information (PII). At the same time, the current processes required to handle these privacy-related request...

Quality Travel Automated by Friends

I have been fortunate to have traveled to several countries outside of the United States. One of the best ways to travel is to meet a friend in a new location and leverage their local knowledge to navigate the terrain effectively. TripAdvisor and Yelp don’t stand a chance against a good friend who can easily traverse local customs, find the best historical sites, and point ...

World Backup Day

It seems that there is a holiday for everything now, including the identity security industry. From Day of the Programmer to Data Privacy Day, the cyber world takes a chance to celebrate and educate audiences about the crucial things surrounding cybersecurity and much more. So, it’s no surprise that we celebrate World Backup Day today. So, first question: What is a backup?...

Identity Security: The Foundation of a Successful Cybersecurity Strategy

Identity has transformed from a back-office function to becoming one of the most critical components of a company’s transformation strategy. But how can your company adapt if you do not know who has access to what systems, how they got that access, whether it is still relevant, and what they are doing with that access? Companies need a comprehensive intelligent identity pl...

Identity Security, SpaceX, Ephemeral Entitlements, and Data

It’s a time-worn adage: “What goes up must come down.” This took on a new meaning this past winter. On February 3, 2022, SpaceX launched 49 Starlink satellites. A day later, they were hit by a geomagnetic storm. By February 8th, SpaceX reported that 40 of the original 49 would reenter the Earth’s atmosphere and disintegrate, or they would soon. These precious resources last...

Yapı Kredi Improves Performance & Efficiency Through Enhanced Identity Security

Yapı Kredi is the third-largest private bank in Turkey and has been experiencing fragmented identity processes. Because of this, they decided to review its identity and authorization infrastructure. In the past, Yapı Kredi had different teams operating in siloes. This inevitably stretched the organization and drove it to reorganize its overall structure. The identity and a...