The Identity Blog

The SailPoint Blog
Delivering Dynamic Governance to Potentially High-Risk Users

Authored by: Eric Yuan, Vice President, Global Strategic Partners, SailPoint Detecting risk in an organization is harder than ever before. With a mostly virtual workforce accessing, creating, and storing company and customer confidential information both locally and in cloud storage solutions, the threat surface is more expansive than ever before. Sure, IT has risk monitor...

Three Key Takeaways From Edgile’s Recent Webinar “The Power Behind the SailPoint and Microsoft Partnership”

Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...

Why You’re Managing Access to Your Cloud Infrastructure in a Silo

You often hear the word “silo” used to describe security processes. Still, originally it was used to describe a structure built to store and preserve bulk material such as harvested grains. Fast forward to the 21st century, and the bulk material within organizations is now digital data. Unfortunately, many of these organizations are also utilizing a siloed approach to manag...

Why CISOs & CIOs Need to Rethink Their Approach to SaaS

The future of work depends on SaaS and today’s approach needs a remix. How your identity security strategy needs to reconsider what you consider “visibility” and the dangerous gaps that exist with your current approach. If you are like the other CISOs I regularly speak with, you are probably facing a lot of pressing issues related to the rapid adoption of cloud-based servi...

Introducing SailPoint SaaS Management – Taking Security Beyond Just the Apps You’re Aware Of

You can’t secure what you can’t see. You can’t control what you don’t understand. This reality alongside the rapid pace of change our customers are facing on a daily basis is what fuels some of the exciting updates our team is launching this quarter. The future of work and employee efficiency lies within the Cloud and SaaS, which is a landscape that changes by the minute....

Three Question with EMEA Director of Inside Sales Natalie Maybin

SailPoint EMEA Director of Inside Sales Natalie Maybin’s career wasn’t a straightforward path. She started her journey as a 19-year-old receptionist at Macromedia. Through grit and determination, she worked hard at her career. This led her to sales operations, finance, and marketing for the Middle East and emerging markets at Macromedia. Moving finally into account manageme...

How to Prioritize SaaS Security and Future-Proof Your Identity Program

This blog is the final installment of our three-part series exploring “What is SaaS Management?” In this post, we’ll look at how gaining total visibility and control of all access is essential in today’s enterprise — both for reasons of efficiency and security. Check out part 1 of the series,“The Danger of SaaS Sprawl: How Unsecured Apps Compromise Your Security.” You can c...

We Are With Our Customers Every Step of the Way

The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...

Manufacturing and Rethinking Identity Security: The Time Is Now

As manufacturers modernize operations to keep pace with Industry 4.0 technologies, the need to reassess existing cybersecurity strategies is paramount. Factories have long been enticing targets for industrial espionage, intellectual property theft and even production sabotage. Now, as the line between digital and physical processes continues to blur, the threat of attack in...

The Art of War on Enterprise Access Risks

If Sun Tzu were writing The Art of War today, unequivocally, he would add a few chapters and tactics to address today’s electronic warfare that extends beyond the battlefield. When penning his treatise on war approximately 2,400 years ago, Tzu wasn’t envisioning modern organizations around the world having to arm themselves to defend against cyber threats of every type—incl...