The Identity Blog

The SailPoint Blog
Get the Most Out of Access Request

Self-Service Access Request is one example of a way that organizations enable new and seasoned employees so they can get the access they require to get their jobs done. The concept sounds simple, right? Give users a catalog of items to choose from, allow them to submit requests, and carry the request through necessary reviewers before granting the access. We have found tha...

Three Questions with Gina Miller, Reference Program Manager at SailPoint

Gina Miller may be a new SailPoint crew member, but she is right at home. Like many of us, her career path was less of a straight line and more of a winding, scenic road. Let’s break it down real quick – she studied economics and planned to go into finance but instead found herself in the start-up life. That unexpected turn gave her the chance to wear many hats – one of whi...

What Greek Mythology Can Teach Us About Access Modeling

For fans of Greek mythology, the story of Sisyphus is a bleak example of one assigned to a life of unending, monotonous tasks. Sisyphus ran afoul of Zeus one too many times and was assigned the grueling punishment of forever rolling a massive boulder up a hill. Every time Sisyphus rolled the boulder up the hill, it would roll down, every day, until the end of time. Does t...

Mr. Cooper’s Identity Governance Team Wins Big

We love to celebrate our customers! Mr. Cooper’s Identity Governance Team was named the Cybersecurity Team of the Year for the 2021 Cybersecurity Excellence Awards. They were tasked with replacing their homegrown identity tool with an automated program built on SailPoint. Only catch? They had to do it in just 4 months. By working overtime, collaborating effectively, and kee...

How we designed a scalable and extensible framework for bringing event-driven integrations to our customers

Event Driven Integration with SailPoint Many modern software architectures are implemented using event-driven programming. An event-driven program is designed to receive and react to events such as user clicks in a UI, object changes in a database, or messages originating from other subsystems in a distributed architecture. A state owner broadcasts predefined events when s...

Improve Process Automation using SailPoint and Amazon EventBridge

These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data ...

Making Identity Secure and Easy with SailPoint for Slack

Technology must be easy. We hear this all the time. And of course, you can’t do business without technology. This is where the two must align but that’s not always an easy thing. The rallying cry from your users is “don’t make me think!” This means that we must adapt the technology experience to the way that users typically think and interact during their everyday lives. Th...

Embed Identity Security with SailPoint’s Open, Extensible SaaS Platform

The global pandemic turned the world upside down with a new normal. Just look at the digital transformation. What might have taken five to 10 years before COVID-19 is happening right now in the blink of an eye. With many of us working remotely, technology-driven transformation is now front and center, driving an exponential proliferation of cloud applications as well as cyb...

Y’all Means All

I’ve used the term y’all my entire life. “Y’all” is the conjunction of “you all” and is an expression that is core to my identity as a sixth-generation Texan. I love the simple and assumptively inclusive nature of the word – it’s perfect in nearly every use. More recently, the phrase “y’all means all” has also become a succinct rally cry for inclusion while honoring every p...

CISO 101: How to Walk & Talk Like a CISO with Alex Jalso, West Virginia University

In a modern enterprise, a CISO’s job is constantly changing. They have to deal with the present while anticipating future changes and needs. A CISO needs to be prepared to adapt their organization’s information security strategy at a moment’s notice. Ensuring their organization stays secure is one of their main responsibilities and a strong identity program is an essential ...