The Identity Blog

The SailPoint Blog
Top 3 Takeaways as an Enterprise ISR

Authored by Ashley Gogna Quote by Adam Grant Identity and Core Values I’m someone who thrives on change – I know you’re judging me but hear me out on this. My career path consists of a diverse background in sales and leadership across industries – and although I was in technology sales prior to joining SailPoint, I didn’t have a background in Identity. I allowed myself ...

How IdentityIQ is Preparing Organizations for a VUCA World

Authored by Eric Zimmerman, Product Marketing Manager VUCA world? Yes, you read that right. VUCA: Volatility, uncertainty, complexity, and ambiguity. It’s a concept that originated with students at the U.S. Army War College to describe the world after the Cold War. The idea was further popularized in 1987 through the leadership theories of Warren Bennis and Burt Nanu. They...

World Password Day

Today is World Password Day – the perfect opportunity to ensure we are doing all we can to manage our online logins. Passwords are a key to our digital identity. They allow us to bank, shop, work, and socialize online, but they also protect us. Strong, complex passwords ensure all the information we store online is protected, which is essential for our privacy and security....

Wipro Moves Towards Zero Trust with SailPoint

Wipro Limited is a leading global information technology, consulting, and business process services company. Headquartered in Bangalore, India, Wipro has over 220,000 dedicated employees serving clients across six continents. Wipro is recognized for its comprehensive portfolio of services, a strong commitment to sustainability, and good corporate citizenship. Recently we s...

Artificial Intelligence as a Force Multiplier

Security professionals, identity managers, and IT operations teams are under growing pressure to make fast decisions based on a nonstop flow of alerts, reports, and initiatives to both enable and protect the business. According to a recent cloud security report1, 59% of surveyed IT professionals say they receive more than 500 public cloud security alerts per day; 38% receiv...

Women in Identity Security: Vicki Sainz

From physical therapy to bookkeeping to AI, Vicki Sainz, Staff QA Engineer, has had an eventful journey to identity security. In this blog, Vicki details her path to AI and shares how SailPoint’s culture has provided her with the tools for success. How did you come to your identity security career? I came from a family where going to college was an expectation, and my fat...

Globe Telecom: Identity Empowers a Seamless User Experience

Globe Telecom, Inc is a primary telecommunications services provider in the Philippines. The company serves consumers’ and businesses’ telecommunications and technology needs across various products and services. Supported by over 8,300 employees and over 1.1 million retailers, distributors, and business partners nationwide, the company currently has over 85 million custome...

Zero Trust and the Future of the Workplace

There has never been a more challenging time managing cyber risk and responding to the challenges of an ever-changing business landscape than today. A recent Forrester report investigated new challenges modern enterprises face, like: A sharp increase in the number of remote workers and non-employee workers More types of users, non-human entities, devices, and data sources...

Identity Management Day

Today, we celebrate Identity Management Day. What is that you might ask? Identity Management Day is about raising awareness of the importance of identity management and securing digital identities and sharing best practices to help organizations and consumers be identity smart. Identity-related breaches are ubiquitous and preventable, whether you are an individual or a For...

Identity Outliers – Discover & Remediate Anomalous Identities

What if you could discover risky identities within an organization as easily as you search for your next favorite song on Spotify? Leverage SailPoint’s security expertise to surface Outlier identities. Press “remediate” or “ignore” to train the AI/ML to adapt to your organization’s unique security preferences. The music industry was revolutionized by the advent of AI/ML. W...