The Identity Blog

CISA Q&A: The Road to Continuous Monitoring and Zero Trust Access Control

Authored by George V. Hulme  Two of the most important trends in cybersecurity today are continuous security monitoring and the implementation of zero trust access controls. In the federal government, continuous monitoring and remediation fall under the purview of the Continuous Diagnostics and Mitigation program, known widely as CDM. CDM kicked off in earnest in 2014 and maybe one of the most ambitious cybersecurity efforts ever.  Led by […]

Identity Discombobulated – Reorienting Identity in the Enterprise

Authored by Gary Savarino, Identity Strategist APAC Identity is not a new concept. Since the invention of the ‘digital identity,’ organizations have been tackling the challenges of identity with various approaches for decades. Identity capabilities, often generically categorized as Identity and Access Management (IAM) or Identity Management (IDM), represent multiple […]

Finding the Needles (Shadow IT) in the Haystack

Authored by Barak Kaufman The explosion of SaaS continues and has become a major challenge for enterprise security teams. Organizations now store nearly all of their most sensitive corporate data in cloud applications.   Additionally, the use of shadow SaaS applications (hidden from IT) is a widespread issue. According to SailPoint’s research, most organizations have 3.5-4x more SaaS apps in use by employees than the IT & Security teams are aware of.  Each one of these SaaS applications introduces new […]

Correlated Identities from IDN within CAM

Authored by Doug Fierro A fundamental question we have been helping customers with for years is also a very basic one: who has access to what? This includes access to environments, applications, systems, and repositories across the IT landscape from an IT perspective. This was not a simple task before […]

Can You Prevent Access Risks Before They Happen?

Authored by Alex Gambill Preventing access risks is like building defenses for a castle. There are ramparts that form a perimeter and a moat to deter invaders because it’s a lot easier to keep enemies out than to remove them once they’re in. Trying to rid a system of risks after threats have been detected is analogous to building a moat around a castle after the enemy is inside.  We can think of identity security as the moat that forces users through a checkpoint that controls entry. User identification is the most relevant security […]

Navigate 2021 – Round Two: The Identity Security Awards

As Navigate ‘21 begins today in EMEA, we are thrilled to celebrate a new group of identity security award winners. The competition across our amazing customers was tough, especially considering the heightened focus on identity security strategies coming out of last year. Our customers truly understand the importance of securing digital identities and are energized about taking identity security to the next level. And they are doing so while proudly representing SailPoint’s core values of innovation, impact, and individuals.   Today we honor three customers with […]

Closing out Navigate 2021 – Identity Security Winners

Our final event of Navigate ‘21 kicks off today in APJ. It has been an exciting conference so far, connecting with attendees to understand what their business and security confidence looks like. Hearing from our customers, we know they are confident in their organisations’ identity security strategy and are meeting today’s complex identity challenges with flexibility, innovation, and expertise. With that, we are delighted to honor our The Identity Security Award winners across the globe, with representation in the Americas, EMEA, and now, APJ.   SailPoint’s Identity […]

A Conversation with SailPoint & Nelnet

Authored by Katherine Cola Nelnet, Inc. is a student loan servicing company specializing in consumer finance, telecommunications, and K-12 and higher education. With offices around the globe and 6,500+ associates, Nelnet has built a robust identity security program. Nelnet’s identity program set out to solve challenges around user onboarding, offboarding, […]

What if Identity Security and Access Management Didn’t Exist?

Authored by Karen Kelvie, Partner Marketing at Thales, and Taylor Wiggins, Product Marketing Manager – Technology Alliance at SailPoint In the world of tech, we love to future gaze. But while imagining potential new developments is exciting, it can be equally helpful to think about the reverse: How would things […]

Navigate 2021 – The Identity Security Awards

Navigate ‘21 has officially kicked off in the Americas! Each year at the conference, SailPoint honors companies who are raising the bar for identity security by elevating their organization’s security posture and allowing their employees to focus on contributing to business impact. This year’s Identity Security Award winners are living […]