Skip to Main Content

Customer Stories

FedRAMP ATO process and timeline: SailPoint’s 5 step journey

The Federal Risk and Authorization Management Program (FedRAMP) is a U.S. government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP authorization process is designed to ensure that cloud services used by federal agencies meet the government’s stringent security […]

Reducing risk and increasing compliance through non-employee risk management

What good is the strongest door lock if all the windows in your house are unlocked and not monitored?   Unfortunately, that’s the situation for too many organizations when it comes to lifecyle management and risk management of non-employees. For example, a recent PwC Survey found that only 40% of survey […]

Using identity to reduce the burden of managing SaaS sprawl

Software-as-a-service (SaaS) solutions can be a huge improvement over traditional IT solutions in many ways, from cost and scalability to easier deployment and maintenance. Those benefits (and others) are helping to drive rapid growth in the SaaS market, which is projected by Gartner to top 16% in 2023.   But with […]

Voices of experience – What’s the role of a cloud-first approach to identity security?

Managing cyber security for an organization is an ongoing process that evolves as an organization’s infrastructure, applications, technology, and user base evolves.  For many organizations, cloud is an important part of that evolution. Some organizations have gone fully to the cloud with applications and data; others are still wholly on-premises, […]

Voices of experience – Best practices for initiating an IAG project

Most companies do not doubt that implementing identity and access governance in their organization might be a good idea. But what’s the best way to do it?  By following the advice of those who have gone before. Specifically, at Navigate 2022 in London, IT leaders from various industries recently shared […]

Voices of experience – real-world benefits of identity security 

Regardless of what industry you’re in, identity security must be a component of your overall cyber security strategy. Identity security is a critical line of defense against cyber threats, enabling the management and governance of access for every digital identity in an organization.  Digital identities, such as email addresses or […]

Voices of experience – Industry trends driving the need for Identity and Access Governance (IGA)

From digital transformation to cloud computing to the Internet of Things, to employees using their own devices and working remotely worldwide, today’s organizations need to manage more IT connections across more devices from more places.  Yet all these “things” accessing other “things” increases the security risk and the possibility that […]

Voices of experience – Why IT leaders consider identity security essential to their business

When is cyber security not just security? When it’s identity security.   While good cyber security is critical for protecting data and avoiding online attacks and hacks, some security solutions can deliver increased security and much more. In fact, identity security enables a broad range of values beyond basic access management […]

Vodafone Turkey Strengthens Their IAM Program with SailPoint

Authored by Nataliia Gnatiienko, Customer Marketing Manager Vodafone operates mobile and fixed networks in 21 countries and partners with mobile networks in 48 more. As of June 2022, the company had over 300 million mobile customers, more than 28 million fixed broadband customers, and 22 million TV customers. Vodafone is […]

Flinders University Builds an Identity Program for Higher Education

Authored by Nataliia Gnatiienko, Customer Marketing Manager Flinders University is a leading international university in Australia with a record of excellence and innovation in teaching, research, and community engagement. The University was retiring its legacy identity warehouse as it was no longer supported and required substantial maintenance. Looking for a cloud-first […]