The Identity Blog

The SailPoint Blog
Finding the Needles (Shadow IT) in the Haystack

Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications. Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x...

Correlated Identities from IDN within CAM

Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before the accelerated growth of cloud adoption. The complexities of how cloud ...

Can You Prevent Access Risks Before They Happen?

Authored by Alex Gambill Preventing access risks is like building defenses for a castle. There are ramparts that form a perimeter and a moat to deter invaders because it’s a lot easier to keep enemies out than to remove them once they’re in. Trying to rid a system of risks after threats have been detected is analogous to building a moat around a castle after the enemy is i...

Navigate 2021 – Round Two: The Identity Security Awards

As Navigate ‘21 begins today in EMEA, we are thrilled to celebrate a new group of identity security award winners. The competition across our amazing customers was tough, especially considering the heightened focus on identity security strategies coming out of last year. Our customers truly understand the importance of securing digital identities and are energized about tak...

Closing out Navigate 2021 – Identity Security Winners

Our final event of Navigate ‘21 kicks off today in APJ. It has been an exciting conference so far, connecting with attendees to understand what their business and security confidence looks like. Hearing from our customers, we know they are confident in their organisations’ identity security strategy and are meeting today’s complex identity challenges with flexibility, innov...

A Conversation with SailPoint & Nelnet

Authored by Katherine Cola Nelnet, Inc. is a student loan servicing company specializing in consumer finance, telecommunications, and K-12 and higher education. With offices around the globe and 6,500+ associates, Nelnet has built a robust identity security program. Nelnet’s identity program set out to solve challenges around user onboarding, offboarding, and access certi...

What if Identity Security and Access Management Didn’t Exist?

Authored by Karen Kelvie, Partner Marketing at Thales, and Taylor Wiggins, Product Marketing Manager – Technology Alliance at SailPoint In the world of tech, we love to future gaze. But while imagining potential new developments is exciting, it can be equally helpful to think about the reverse: How would things be different if certain technologies didn’t exist? For exampl...

Navigate 2021 – The Identity Security Awards

Navigate ‘21 has officially kicked off in the Americas! Each year at the conference, SailPoint honors companies who are raising the bar for identity security by elevating their organization’s security posture and allowing their employees to focus on contributing to business impact. This year’s Identity Security Award winners are living out SailPoint’s core values: innovatio...

The Power of Identity Gives Integris Health the Power to be Compliant and Secure

Integris Health is a growing healthcare organization with more than 10,000 full-time employees and 5,000 contract employees across several facilities and clinics. Identity Security Challenges Healthcare organizations are under increased scrutiny around how they protect and secure access to patients’ private healthcare information. To ensure adequate privacy and security p...

SailPoint Selected for NIST Zero Trust Implementation Project to Mitigate National Cybersecurity Risk

Authored by Frank Briguglio, CISSP | SailPoint Public Sector Strategist Digital transformation and IT modernization are increasing the adoption of cloud data and applications at a pace never seen before. Now, our borders are open to remote users and non-traditional mission partners, which have dissolved traditional network boundaries rendering them ineffective. Today, to b...