Insights and thought leadership

The SailPoint Blog
Automate Identity Security with SailPoint’s Latest Product Update

Automation is key to scaling identity security. With so much data, there are not enough experts and resources to keep up with and keep track of every intertwining workstream and application that cross different identities. It has moved far beyond human capacity at this point. At SailPoint, automation is one of the core pillars of our products. We aim to free up time so our ...

Close Risky Security Gaps and Increase Efficiency with Identity Security Automation

It surprises me that in today’s digitally accelerated world, many organizations are still trying to manage and secure their identities with manual processes – using older means like spreadsheets, for example – which is nearly impossible. According to our recent survey, 55% of companies still rely on manual processes to adjust user access when IT environments change. This op...

SailPoint Authorized as a CVE Numbering Authority (CNA)

As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...

The Ah-ha Moment in Identity Security for Healthcare

Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...

Artificial Intelligence as a Force Multiplier

Security professionals, identity managers, and IT operations teams are under growing pressure to make fast decisions based on a nonstop flow of alerts, reports, and initiatives to both enable and protect the business. According to a recent cloud security report1, 59% of surveyed IT professionals say they receive more than 500 public cloud security alerts per day; 38% receiv...

How Our New Product Suites Are Setting the Standard for Identity Security

People tend to want what they need. This is as true for technology solutions as it is for everything else. But while the truism may sound simple in theory, the unfortunate truth is that people don’t always know what they need. Often, customers need to see for themselves the positive outcomes that stem from implementing a solution before they understand why it is necessary. ...

Identity Security, SpaceX, Ephemeral Entitlements, and Data

It’s a time-worn adage: “What goes up must come down.” This took on a new meaning this past winter. On February 3, 2022, SpaceX launched 49 Starlink satellites. A day later, they were hit by a geomagnetic storm. By February 8th, SpaceX reported that 40 of the original 49 would reenter the Earth’s atmosphere and disintegrate, or they would soon. These precious resources last...

The Core Components of Identity Security

Over the last few months, organizations have seen a shift in managing and securing identities, and it has moved well beyond human capacity. In order to do this effectively, organizations need artificial intelligence and machine learning at the core of their identity solution to automate the discovery, management, and control of all user access throughout their digital life ...

Thoughts on Life & Work: Love

This post originally appeared from Mark McClain’s LinkedIn article series, Life & Work. The views and opinions expressed in this blog are solely owned by the author. Early in my life, I was introduced to a list of characteristics that were penned by the ancient Saint Paul, a first-century contemporary and follower of Jesus. It always fascinated me that this list—Love, Joy,...

Data Privacy Day 101

Data Privacy Day (known in Europe as Data Protection Day) is an international event that occurs every year on January 28. The purpose of the day is to raise awareness about how businesses and individuals can promote privacy and data protection best practices. But where did Data Privacy Day come from and how can you celebrate and protect yourself? We get into the 101 below. ...