Skip to Main Content

Market Views

Why Healthcare Providers Need to Rethink the Impact of Identity Governance

In today’s digitized healthcare environment, many providers continue to view cybersecurity as an IT challenge. However, it is important to step back and consider how data security facilitates information exchange, which is essential to the industry’s current integrated approach to patient care. When observed in this context, provider organizations can […]

Identity Governance Evolving in the Enterprise

Global enterprises have a lot of changing needs as they constantly pivot to address ever-changing business requirements. This is forcing more and more enterprises to evolve their infrastructure. While some are moving to a cloud-first strategy, others are looking for a delivery option that reduces their needs for skilled staff […]

Your Password (Strategy) is Incorrect, Please Try Again

Passwords. We all love to hate them. And while some technology companies, like Microsoft, Google and Apple are working hard to rid the world of passwords, this standard method of authentication isn’t going away anytime soon. Passwords are a vital part of the security posture for most companies, yet they […]

Charting Uncharted Waters: Comprehensive Identity Governance

Over the past two blogs in this series, I have explored the issues facing identity governance teams with the growing amount of sensitive data stored in files across the organization. Let’s quickly recap where we left off last time when we explored the three key reasons governing access to files […]

Gartner IAM Summit Feet on the Street: The Top 3 Priorities for Identity

Each spring, identity professionals come together for the annual Gartner IAM Summit in London to learn about new trends and vendor solutions, and to network with other like-minded individuals.  This years’ event was rich with insights from Gartner, vendors and organizations who shared their own challenges, solutions and best practices. […]

The Importance of Governing Access to Data Stored in Files

According to Gartner*, upward of 80 percent of enterprise data today is unstructured. ‘Unstructured’ data refers to files like spreadsheets, presentations, documents, PDFs or other user-generated content that is typically stored in unstructured systems like a file share or cloud storage application like Box or Dropbox. As the modern enterprise […]

Mistaken Identity: The Robots are Coming

Robotic Process Automation (RPA) dominates the discussion in this episode of Mistaken Identity. David Lee and Mike Kiser explore the risks and rewards of the looming robot takeover—and how identity is the key to success in both naval warfare and securing automated bots. Also discussed: valid certificates obtained through stolen […]

A CISO’s View of Successful Identity Governance

In a modern enterprise, a CISO’s job is a complicated one. With the increasing risk of cyberattacks, and need for a flexible work environment, security and accessibility are in a never-ending competition. Every organization’s IT infrastructure is different, but most CISO’s would agree that a secure enterprise has a strong […]

A Proposed Maturity Model for Identity Governance and Analytics: Assimilating the Data

“Caminante, no hay camino. Se hace camino al andar.” Wanderer, there is no path. The path is made by walking. At the start, Identity Governance can seem an impossible task—much like pairing socks from a fresh load of laundry, or buying a toilet brush from Amazon, or, as I described […]

Friday Quick Take: Securely Enabling Government Employees

We often hear of employee churn in the federal government, particularly as new administrations take office. Hear from SailPoint’s Chief Strategy Officer Kevin Cunningham on Federal News Radio on how the power of identity allows agencies to manage this turnover and enable their employees to be productive and secure from day one.