Market Views

The SailPoint Blog
Fundamentals of Access Certification and Compliance

Authored by Jerry Aubel, Senior Product Manager “Audit time and the living is easy!” I suspect the thought of the following access certification review doesn’t have you whistling down the hall, but it doesn’t have to be a burden. User access certification is a critical process for any enterprise. Automating it can make it easy for Identity teams and the business to meet re...

Automate Identity Security with SailPoint’s Latest Product Update

Automation is key to scaling identity security. With so much data, there are not enough experts and resources to keep up with and keep track of every intertwining workstream and application that cross different identities. It has moved far beyond human capacity at this point. At SailPoint, automation is one of the core pillars of our products. We aim to free up time so our ...

Close Risky Security Gaps and Increase Efficiency with Identity Security Automation

It surprises me that in today’s digitally accelerated world, many organizations are still trying to manage and secure their identities with manual processes – using older means like spreadsheets, for example – which is nearly impossible. According to our recent survey, 55% of companies still rely on manual processes to adjust user access when IT environments change. This op...

SailPoint Authorized as a CVE Numbering Authority (CNA)

As part of SailPoint’s ongoing commitment to the security of its products and services and to further promote transparency in the protection of its offerings, SailPoint has been authorized by the CVE Program as a CVE Numbering Authority (CNA), which enables SailPoint to assign CVEs to vulnerabilities identified in its offerings. Once a vulnerability in a SailPoint offering...

The Ah-ha Moment in Identity Security for Healthcare

Authored by Matthew Radcliffe Historically and as early as three years ago, healthcare organizations may have thought having an identity security program was as simple as having single-sign-on (SSO). However, COVID shined a spotlight on a variety of process gaps across healthcare organizations when it came to managing the access of clinical staff including hospitalists, af...

Artificial Intelligence as a Force Multiplier

Security professionals, identity managers, and IT operations teams are under growing pressure to make fast decisions based on a nonstop flow of alerts, reports, and initiatives to both enable and protect the business. According to a recent cloud security report1, 59% of surveyed IT professionals say they receive more than 500 public cloud security alerts per day; 38% receiv...

Zero Trust and the Future of the Workplace

There has never been a more challenging time managing cyber risk and responding to the challenges of an ever-changing business landscape than today. A recent Forrester report investigated new challenges modern enterprises face, like: A sharp increase in the number of remote workers and non-employee workers More types of users, non-human entities, devices, and data sources...

How Our New Product Suites Are Setting the Standard for Identity Security

People tend to want what they need. This is as true for technology solutions as it is for everything else. But while the truism may sound simple in theory, the unfortunate truth is that people don’t always know what they need. Often, customers need to see for themselves the positive outcomes that stem from implementing a solution before they understand why it is necessary. ...

Identity Security, SpaceX, Ephemeral Entitlements, and Data

It’s a time-worn adage: “What goes up must come down.” This took on a new meaning this past winter. On February 3, 2022, SpaceX launched 49 Starlink satellites. A day later, they were hit by a geomagnetic storm. By February 8th, SpaceX reported that 40 of the original 49 would reenter the Earth’s atmosphere and disintegrate, or they would soon. These precious resources last...

The Core Components of Identity Security

Over the last few months, organizations have seen a shift in managing and securing identities, and it has moved well beyond human capacity. In order to do this effectively, organizations need artificial intelligence and machine learning at the core of their identity solution to automate the discovery, management, and control of all user access throughout their digital life ...