Event Driven Integration with SailPoint Many modern software architectures are implemented using event-driven programming. An event-driven program is designed to receive and react to events such as user clicks in a UI, object changes in a database, or messages originating from other subsystems in a distributed architecture. A state owner broadcasts predefined events when s...
The Identity Blog
These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data ...
Technology must be easy. We hear this all the time. And of course, you can’t do business without technology. This is where the two must align but that’s not always an easy thing. The rallying cry from your users is “don’t make me think!” This means that we must adapt the technology experience to the way that users typically think and interact during their everyday lives. Th...
The global pandemic turned the world upside down with a new normal. Just look at the digital transformation. What might have taken five to 10 years before COVID-19 is happening right now in the blink of an eye. With many of us working remotely, technology-driven transformation is now front and center, driving an exponential proliferation of cloud applications as well as cyb...
I’ve used the term y’all my entire life. “Y’all” is the conjunction of “you all” and is an expression that is core to my identity as a sixth-generation Texan. I love the simple and assumptively inclusive nature of the word – it’s perfect in nearly every use. More recently, the phrase “y’all means all” has also become a succinct rally cry for inclusion while honoring every p...
In a modern enterprise, a CISO’s job is constantly changing. They have to deal with the present while anticipating future changes and needs. A CISO needs to be prepared to adapt their organization’s information security strategy at a moment’s notice. Ensuring their organization stays secure is one of their main responsibilities and a strong identity program is an essential ...
Meet Nicolette Stewart, Associate Manager, Customer Success Management at SailPoint. Her career journey started back in 2001 where she worked as Provincial Secretary for the Director of the Fraud Unit in the South African Police Force. While that may sound like an unlikely beginning to where she is now, it fed her curiosity in online security safety and how easy it is to fa...
If you hopped into a time machine and followed SailPoint’s journey in the last 15 years, you’ll see that our approach to innovation has been integral in how we’ve constantly evolved identity security. Our goal is to meet and exceed our customers’ pressing identity needs year after year. It’s one of the main things that drew me to SailPoint when I joined the team last spring...
Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...
In our first segment with Mark Morrison, Chief Security Officer for The Options Clearing Corporation (OCC), we discussed his beginnings in cybersecurity and what has changed over the years. In this Q&A, we continued from where we left off with identity management and take a deep dive into his thoughts on cyber resilience and zero trust. As a reminder, before joining OCC, M...