Market Views

The SailPoint Blog
Essentials of Joiner-Mover-Leaver Functions

Authored by Jerry Aubel, Senior Product Marketing Manager Imagine this – You’re attending the Identity Security equivalent of the Oscars. Anticipation is palpable as the host begins to announce the winner of the coveted “Identity Process of the Year” award…and the winner is Joiner-Mover-Leaver! Perhaps that’s a geek pipedream. But even if joiner-mover-leaver (JML) policie...

The Future of Identity Security: Four Major Elements

Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...

The Emerging Landscape of Healthcare Cyber Insurance

Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...

Rethinking the Identity Security Paradigm: Three Ways to Stay Ahead of Identity-related Threats

Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...

Emergency Access Management: Manage Critical Security Measures with Ease

Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...

SaaS Workflows: Re-think Automation with SailPoint Identity Security Cloud

Authored by Jerry Aubel, Senior Product Marketing Manager Automation is an important key to a more efficient Identity Security program. One where you can concentrate more on execution and less on building manual processes. That’s why we are excited to talk to you about SailPoint Identity Security Cloud SaaS Workflows. SaaS Workflows can automate and orchestrate less defina...

The Horizons of Identity Security

Nobel prize-winning author John Steinbeck once said, “…to find where you are going, you must know where you are.” Having a starting point in whatever journey you are undertaking is vital as the path forward starts from there. In the case of our world, identity security for large, complex enterprises – it’s not about a distinct start and end point. It’s not one-and-done. It...

Mature Your IGA Solution with a Role-Based Framework

By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...

Cybersecurity in Healthcare: The Value of Leveraging Identity Security to Manage EHR Access

Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...

Identity security remains business essential

When the pandemic took root back in 2020, companies moved to triage mode in order to rapidly become a 100% virtual workforce. The most pressing item on their list: get everyone access to everything they need to be productive on the job from home. Not only was the shift swift, it also created a significant margin for error when it came to the security of the business becaus...