Self-Service Access Request is one example of a way that organizations enable new and seasoned employees so they can get the access they require to get their jobs done. The concept sounds simple, right? Give users a catalog of items to choose from, allow them to submit requests, and carry the request through necessary reviewers before granting the access. We have found tha...
The Identity Blog
Gina Miller may be a new SailPoint crew member, but she is right at home. Like many of us, her career path was less of a straight line and more of a winding, scenic road. Let’s break it down real quick – she studied economics and planned to go into finance but instead found herself in the start-up life. That unexpected turn gave her the chance to wear many hats – one of whi...
For fans of Greek mythology, the story of Sisyphus is a bleak example of one assigned to a life of unending, monotonous tasks. Sisyphus ran afoul of Zeus one too many times and was assigned the grueling punishment of forever rolling a massive boulder up a hill. Every time Sisyphus rolled the boulder up the hill, it would roll down, every day, until the end of time. Does t...
We love to celebrate our customers! Mr. Cooper’s Identity Governance Team was named the Cybersecurity Team of the Year for the 2021 Cybersecurity Excellence Awards. They were tasked with replacing their homegrown identity tool with an automated program built on SailPoint. Only catch? They had to do it in just 4 months. By working overtime, collaborating effectively, and kee...
Event Driven Integration with SailPoint Many modern software architectures are implemented using event-driven programming. An event-driven program is designed to receive and react to events such as user clicks in a UI, object changes in a database, or messages originating from other subsystems in a distributed architecture. A state owner broadcasts predefined events when s...
These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data ...
Technology must be easy. We hear this all the time. And of course, you can’t do business without technology. This is where the two must align but that’s not always an easy thing. The rallying cry from your users is “don’t make me think!” This means that we must adapt the technology experience to the way that users typically think and interact during their everyday lives. Th...
The global pandemic turned the world upside down with a new normal. Just look at the digital transformation. What might have taken five to 10 years before COVID-19 is happening right now in the blink of an eye. With many of us working remotely, technology-driven transformation is now front and center, driving an exponential proliferation of cloud applications as well as cyb...
I’ve used the term y’all my entire life. “Y’all” is the conjunction of “you all” and is an expression that is core to my identity as a sixth-generation Texan. I love the simple and assumptively inclusive nature of the word – it’s perfect in nearly every use. More recently, the phrase “y’all means all” has also become a succinct rally cry for inclusion while honoring every p...
In a modern enterprise, a CISO’s job is constantly changing. They have to deal with the present while anticipating future changes and needs. A CISO needs to be prepared to adapt their organization’s information security strategy at a moment’s notice. Ensuring their organization stays secure is one of their main responsibilities and a strong identity program is an essential ...