The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...
The Identity Blog
As manufacturers modernize operations to keep pace with Industry 4.0 technologies, the need to reassess existing cybersecurity strategies is paramount. Factories have long been enticing targets for industrial espionage, intellectual property theft and even production sabotage. Now, as the line between digital and physical processes continues to blur, the threat of attack in...
If Sun Tzu were writing The Art of War today, unequivocally, he would add a few chapters and tactics to address today’s electronic warfare that extends beyond the battlefield. When penning his treatise on war approximately 2,400 years ago, Tzu wasn’t envisioning modern organizations around the world having to arm themselves to defend against cyber threats of every type—incl...
SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to adopt a smarter and more ...
Remember the “easy button” from Staples that was all the rage in the workplace a few years ago? Well, I get this question all the time – is there a way to make this any easier, like an “easy button” for identity security? And truth be told, for what we do, the value we provide to customers, there isn’t an “easy button,” at least not in the traditional sense, but we do mak...
When the discussion of “digital transformation” comes up, what often first springs to mind is the digital transformation of private sector businesses. But the reality is that public sector organizations are just as busy transforming the services they offer to their citizens. Consider the Internal Revenue Service’s newly created Enterprise Digitalization and Case Management ...
In the classic book Zen and the Art of Motorcycle Maintenance, a father and son take a cross-country motorcycle trip to connect. While the book is as philosophical as you can get, for today, I want to focus on one concept in the novel that resonated with me and how it applies to our technological innovation, particularly with identity security, in the months to come. The f...
This blog is part two in a three-part series exploring “What is SaaS Management?” In this installment, we’ll dig into the rise of SaaS and its incremental impact on identity security, and how this impacts IT teams. You can see the first installment of the series here: The Danger of SaaS Sprawl: How Unsecured Apps Compromise Your Security. Speed vs. security. It’s the etern...
In a previous article, SailPoint EVP of Product, Grady Summers, depicts two seismic trends posing significant problems and challenges within organizations today: the rapid adoption of Software as a Service (SaaS) – mainly through Shadow IT – and the creation and movement of massive amounts of sensitive corporate data into the cloud. Grady justifiably asserts that both of th...
Steve McMahon is the Chief Information Officer at Splunk. The CIO plays a critical role in helping IT professionals get the resources and the budget they need to maximize company productivity and make complex tasks easily achievable. The goal? Implement technology that is going to help your organization deliver a competitive advantage. The Path to CIO Steve’s career path ...