Market Views

Mitigating Insider Threats with Privileged Access Governance

Authors: Kelvin Mbatu, Avinash Rajeev, Vivek Tejwani, Radhakrishnan Subramaniyan Enterprises have become increasingly reliant on digital information to meet business objectives, effectively manage operations, and compete in a digitally connected world. The digital ecosystem demands that organizations transform their identity and access management (IAM) programs to protect and monitor critical […]

How to Get Hacked This Holiday Season

Editor’s note: This is satire. SailPoint strongly encourages you to take your cybersecurity very seriously, and if you’re looking for some ways to do that then head over to this blog post. The season of giving and goodwill has arrived once more. Jolly tunes are playing in the distance, department stores are raising their holiday […]

The Importance of Identity in a Hybrid IT World

If your organization is like many, you’re moving more and more applications to the cloud or introducing numerous APIs into your environment as a part your digital transformation. Wherever you are in the various stages of your cloud journey, even if you have a cloud-first mandate, you will find yourself […]

2019 Market Pulse Survey: Good Bot, Bad Bot

There are two sides to every coin. This analogy is especially true when we talk about the ever-present use of software bots in organizations today. On one side of the coin, we can all agree that bots are time-savers. In one case, bots helped this company automate over 100 tasks […]

Enable Business Growth and Strengthen Security

Consumers are demanding rapid adoption of a purely digital landscape, and at the center of today’s challenges are compromised identities. What do threat actors use to gain access to your data? Identity. And, like the explosion of data, threat actors’ methods are more sophisticated and precise than ever before, making […]

Balancing Zero Trust with a strong identity strategy and AI

The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what the latest breaches show us: three out of 5 organizations expect to be breached. On average, it takes an average of 74 […]

The Step-by-Step Guide to CCPA Compliance

California is just one in a string of many states to enact legislation that puts the responsibility of privacy in the hands of businesses. There are 54 days until the CCPA takes effect, but who’s counting? If you do business in California, then you probably should be.   The CCPA in particular impacts […]

Identity Imperatives for IT Modernization

Chances are, no matter the size of your organization, you’re being challenged to meet shifting expectations of your users. Across industries and geographies, we’ve seen how organizations have used identity to respond to changing trends and stay secure while meeting users’ needs. Read on for top trends in IT modernization […]

What Does Cloud-First and Identity Security Really Mean to Business?

As organizations adopt new technologies and evolve their business protocols through Digital Transformation, what’s the effect on identity and access management (IAM)? In the past, IAM was focused on internal human identities and on-premises applications. Today, it’s also about external identities, including contractors, business partners, clients and the Internet of […]

Back to School: National Cybersecurity Awareness Month Edition

My first cybersecurity memory is working on my Commodore 64 computer with a military-grade type dial-up modem. This was before the Internet and I would use a BBS systems (bulletin board systems) where I would dial in to see and learn about security and hacking topics. This was a time when phone phreaking was all the craze.  It seems like […]