This week, SailPoint released a new report titled The State of Identity Security 2023: A Spotlight on Healthcare. The report examines what identity security looks like in the healthcare industry today, particularly in the face of continuing challenges, including chronic staffing shortages, the ongoing increase in malicious cyberattacks against providers, and the growing num...
Insights and thought leadership
What limits the size of a city? It’s not a particular industry, nor is it a favorable setting. What limits the size of a city is the speed of its transportation. As innovation accelerated transport, cities grew larger; people could range further for school, work, and community. But even this new growth, it created a new set of problems caused by the sheer scale of the urba...
As a leading provider of identity governance solutions, we understand the importance of demonstrating the value and capabilities of our products to existing and potential customers. That’s why we offer interactive demos to showcase how our identity security platform can help discover, manage, and secure all identities across the modern enterprise. One of the key benefits o...
Authored by Jaishree Subramania, Vice President of Product Marketing In my last blog, we looked at the four major elements defining the future of identity security – derived from our 2022 Horizons of Identity Security research study. While it may take some time to reach different aspects of this future, we do know that all companies are on a journey to get there – even tho...
One of the things that really energized me when thinking about our next chapter under Thoma Bravo was the promise of accelerated innovation to the benefit of our rapidly growing enterprise customer base. You’ll see us make some moves in 2023 (and beyond) to increase our velocity of innovation, delivering transformative value in identity security. Today is one step forward ...
Authored by Jerry Aubel, Senior Product Marketing Manager Imagine this – You’re attending the Identity Security equivalent of the Oscars. Anticipation is palpable as the host begins to announce the winner of the coveted “Identity Process of the Year” award…and the winner is Joiner-Mover-Leaver! Perhaps that’s a geek pipedream. But even if joiner-mover-leaver (JML) policie...
Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...
Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...
Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...
Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...