Pop the Waterloo sparkling water (we are big fans at the SailPoint HQ) or the real-deal bubbles, depending on what part of the world you are in, because we are celebrating this week! Recently, the SailPoint Crew (if you’re new here, that is what we like to call ourselves) was named Overall Leader in KuppingerCole’s Leadership Compass Identity as a Service-Identity Governanc...
The Identity Blog
Authored by Katherine Cola With over 100 years of automotive experience, General Motors (GM) is familiar with adapting their business to meet evolving security challenges head-on. Tray Wyman, Director of Identity and Access Management at GM recently shared the important role identity security plays in their organization’s strategy. Minimizing certification fatigue, levera...
Authored by George V. Hulme Two of the most important trends in cybersecurity today are continuous security monitoring and the implementation of zero trust access controls. In the federal government, continuous monitoring and remediation fall under the purview of the Continuous Diagnostics and Mitigation program, known widely as CDM. CDM kicked off in earnest in 2014 and m...
Authored by Gary Savarino, Identity Strategist APAC Identity is not a new concept. Since the invention of the ‘digital identity,’ organizations have been tackling the challenges of identity with various approaches for decades. Identity capabilities, often generically categorized as Identity and Access Management (IAM) or Identity Management (IDM), represent multiple disti...
Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications. Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x...
Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before the accelerated growth of cloud adoption. The complexities of how cloud ...
Authored by Alex Gambill Preventing access risks is like building defenses for a castle. There are ramparts that form a perimeter and a moat to deter invaders because it’s a lot easier to keep enemies out than to remove them once they’re in. Trying to rid a system of risks after threats have been detected is analogous to building a moat around a castle after the enemy is i...
As Navigate ‘21 begins today in EMEA, we are thrilled to celebrate a new group of identity security award winners. The competition across our amazing customers was tough, especially considering the heightened focus on identity security strategies coming out of last year. Our customers truly understand the importance of securing digital identities and are energized about tak...
Our final event of Navigate ‘21 kicks off today in APJ. It has been an exciting conference so far, connecting with attendees to understand what their business and security confidence looks like. Hearing from our customers, we know they are confident in their organisations’ identity security strategy and are meeting today’s complex identity challenges with flexibility, innov...
Authored by Katherine Cola Nelnet, Inc. is a student loan servicing company specializing in consumer finance, telecommunications, and K-12 and higher education. With offices around the globe and 6,500+ associates, Nelnet has built a robust identity security program. Nelnet’s identity program set out to solve challenges around user onboarding, offboarding, and access certi...