The Identity Blog

The SailPoint Blog
The Identity Management Pendulum: Identity Security Mitigates Access Management Risk

It wasn’t so long ago when it was common to think of identity management as a compliance and enablement tool for large enterprises. The market was borne from a compliance standpoint. Since then, SailPoint has led the evolution of identity into what it is today: foundational to securing and enabling today’s digital cloud enterprise. Today, a large part of the world of identi...

T-Mobile: From Legacy to the Cloud

Meet SailPoint customer, T-Mobile. The well-known global wireless telecommunications service provider was looking to migrate from their legacy identity system while in the middle of a merger and acquisition – a sizable task. To accomplish this, they needed an identity solution that would allow them to execute a seamless migration with minimal disruptions to the business. W...

Millicom: What if Identity Didn’t Exist?

We rely on identity for almost everything, which became even more apparent when organizations had to make the quick shift to a remote workforce. Identity stands at the very core of IT operations and allows organizations to manage security and compliance risks. Now imagine if identity didn’t exist… Long time industry veteran and SailPoint customer, John Masserini, Chief Inf...

SailPoint Achieves ServiceNow Built on Now Platform Status

Over the last several months, we’ve seen years-long digital transformation initiatives accelerated into days and weeks to adapt to a new virtual workforce. As a result, managing user access requirements have grown exponentially and even more complex. Keeping up with these access demands while maintaining security and compliance can be overwhelming for your IT teams. This c...

SailPoint Honors Global Partners and Delivery Admirals at Revenue Kick-off 2021

As we kicked off the new year with Revenue Kickoff (RKO), one theme resounded loud and clear: We are limitless in our pursuit to provide the very best customer journey in the Identity Security space. Why? Because we do our homework. Doing our homework means knowing our customers so well that we deliver both innovation and excellence in everything we do. And the velocity to...

State Governments Rely on SailPoint to Address Top Priorities

NASCIO recently released their top priorities for 2021. The NASCIO list is formed by a survey of its membership, whom it asks to prioritize the top issues they face. This year’s results we noticed a few shifts in the top priorities but many that stayed the same from the previous year. The priorities that were added or shifted are no doubt a result of the pandemic and subseq...

Identity Security, A View From the CISO’s Seat

With more than 40 years in IT, about 35 of that in security, Paul de Graaff knows identity inside and out. From implementing a cloud-first strategy to using AI & ML to do more with your program, Paul shares his identity insights in this interview with SailPoint CMO Juliette Rizkallah. Hello everyone, I’m Juliette Rizkallah, and I’m the Chief Marketing Officer for SailPoint...

Protecting Today’s Corporate Digital Identity with Identity Security

Today we try to safeguard our digital identity as much as our wallet and its contents. Our personal digital identity authorizes us to go about our day-to-day—logging into our bank account to pay bills, checking our Facebook page for notifications or scheduling an UberEats delivery for dinner —but then there is our professional digital identity. This version of us authentica...

Euroclear Trusts the Power of Identity

Meet SailPoint customer, Euroclear. Euroclear is one of the leading providers of settlement and related security services for cross-border transactions. They set out looking for an identity solution that would align with their zero-trust initiative. They needed a solution that would not only help them meet their immediate certification goals but would improve their overall ...

Why Working from Home Opened a Cybersecurity Pandora’s Box

Working from home means different things to different people. Almost by all, it’s considered a privilege made possible by technology. For some, it’s considered to be a bit of a challenge (at times) if you also have family members working from home or children (in my case, a five-month-old puppy). And for everyone, it’s considered a Pandora’s box for cybersecurity. Pandora’...