The Identity Blog

The SailPoint Blog
Tricker-Tweet: Identity Security 101 in 11 Tweets

What is Identity Security? You’ve heard the phrase, read long jargony articles about it, but you still aren’t quite clear on what it means. You’re in luck! Below we described identity security in 11 bite-sized tweets. Identity security (also known as identity governance and identity management) protects against cyber threats associated with providing technology access to a...

Why You Should Consider a Cyber Career

At SailPoint, we know that it’s important to love what you do, and love where you do it. If you’re interested in joining a company where you have an impact and can challenge yourself, check out our SaaS engineering and DevOps openings. Cybersecurity is one of the hottest sectors today, with new threats, technology and challenges emerging each day. And with that, there is a...

Nationwide Building Society Meets Business Continuity Plans with Identity Security

Nationwide Building Society is the largest mutual building society in the United Kingdom, providing household savings and mortgages to its members. Sarah Harber, Senior Manager for Access Management at Nationwide, shares her organization’s identity security story, driven by a need to ensure technology evolves alongside the business. Sarah shares that identity is part of Na...

Beach Energy Builds Sustainable Identity Security

Beach Energy is Australia’s premier oil and gas exploration and production company. Responsible for delivering sustainable energy to communities, Beach Energy supplies around 15% of natural gas requirements for Australia’s eastern states. Aaron Finnis, Information Security Manager at Beach Energy, talks with SailPoint about why identity security was so important when buildi...

As the U.S. Government Moves Towards Zero Trust, SailPoint Continues To Support Key Federal Security Initiatives

Authored by Frank Briguglio, CISSP – Public Sector Strategist, SailPoint There’s been a lot of movement from officials to shore up the U.S. government’s security posture. In early September, the Office of Management and Budget (OMB) published the draft strategy “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles” to identify critical security prioritie...

Q&A with Nick Shevelyov, Chief Technology & Risk Strategist at Silicon Valley Bank

Security and privacy have always been important to Nick Shevelyov. One of his earliest memories as a boy was having to walk to the sink and run the water faucet as a way to confound any surveillance bugs within their Moscow apartment. He carried those childhood memories into his cybersecurity career. After 14 years as Chief Security Officer at Silicon Valley Bank (taking 1...

BJ’s Wholesale Club Delivers Savings and Automation with Identity Security

BJ’s Wholesale Club has built a robust infrastructure around access and identity rooted in the automation of manual processes. Steve Breton, Senior Manager of Identity and Access Management at BJ’s recently shared his perspective on the impact automation has had. Steve’s primary focus has been on developing automation to help improve the employee experience, especially the...

Friday Quick-Take: The Water Cooler Version of SailPoint’s Leadership in the Latest Industry Analyst Report

Pop the Waterloo sparkling water (we are big fans at the SailPoint HQ) or the real-deal bubbles, depending on what part of the world you are in, because we are celebrating this week! Recently, the SailPoint Crew (if you’re new here, that is what we like to call ourselves) was named Overall Leader in KuppingerCole’s Leadership Compass Identity as a Service-Identity Governanc...

Everybody In: General Motors Takes Us on a Ride with Identity Security

Authored by Katherine Cola With over 100 years of automotive experience, General Motors (GM) is familiar with adapting their business to meet evolving security challenges head-on. Tray Wyman, Director of Identity and Access Management at GM recently shared the important role identity security plays in their organization’s strategy. Minimizing certification fatigue, levera...

CISA Q&A: The Road to Continuous Monitoring and Zero Trust Access Control

Authored by George V. Hulme Two of the most important trends in cybersecurity today are continuous security monitoring and the implementation of zero trust access controls. In the federal government, continuous monitoring and remediation fall under the purview of the Continuous Diagnostics and Mitigation program, known widely as CDM. CDM kicked off in earnest in 2014 and m...