Market Views

The SailPoint Blog
Our identity security journey: Transforming opportunity to impact

SailPoint has defined the modern identity security space. SailPoint’s first product allowed organizations to attest that access was correct, for compliance reasons. We soon added the ability to provision and deprovision access, which improved compliance but also boosted productivity. Five years ago, we began to invest in artificial intelligence—before it was the buzzword th...

Large language models: What’s under the hood?

SailPoint is always looking for new technologies that can help us improve our products and better serve our customers. One area that has gained significant traction in recent years—and has been attracting mainstream attention in recent months—is Large Language Models (LLMs). In this blog, we’ll delve into LLMs: defining them, pinpointing their technological blind spots, and...

How identity security can be a business accelerator

In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration in a trend that we saw percolating within the enterprise for the last handful of years: digital transformat...

How to simplify healthcare access for non-employees

Today, healthcare organizations manage a wide range of identities beyond employees. Contractors, affiliate physicians, travel nurses, flex nurses, and medical students make up a large percentage of their workforce and manually reviewing and granting access can be error-prone and extremely time-consuming. However, automating secure access and simplifying onboarding can bring...

How to mitigate risk with access to ensure secure identities

Like many things in life, modern identity security solutions are a delicate balance — providing fast, secure, and convenient access to resources for those who need them while ensuring the highest level of security so they can move with speed, agility, and minimal risk. To help organizations achieve this balance on their identity journey, we recently published Identity secu...

Class is in session: Identity security 101

Providing fast, accurate access to digital resources for those who need it is essential for organizations to secure their business and gain a competitive edge. Yet enterprises are facing unprecedented security challenges with more sophisticated cyber threats and growing privacy regulations. To help organizations on their identity journey, SailPoint recently published Ident...

Survey finds non-employee and non-human identities leading to major security issues

Authored by Michael Conti, Product Marketing Manager In true SailPoint fashion, we are always hungry to learn more. More about new technologies, security threats, market needs — the list goes on. So, we recently conducted a global survey of security & IT professionals and executives to better understand how companies manage non-employee and non-human identities and their r...

Legacy (re) defined

The term “legacy” is thrown around a lot in this industry. The immediate connotation is negative — the implication is that your technology is outdated, stagnant, and replaceable. And certainly, there is a short list of vendors in identity who are very much “legacy” in the traditional sense. They’ve given up on innovation. They no longer invest in that area of their busines...

Why air conditioning (and identity security) is crucial: A cautionary tale from a Texan

The high temperatures here in Austin have been hovering at 105F / 41C for a week or two, meaning that the simple invention of air conditioning shifts from a “nice to have” to a “must have.” The irony is that despite being an essential component of houses and businesses HVAC systems are often ignored until they break down. And once the heat starts climbing, air conditioning ...

Multi-tenant SaaS vs. single-tenant SaaS: It matters

CISOs have one of the most challenging jobs today. Not only are they tasked with creating policy that keeps their companies safe, but they are also in charge of executing that plan which often proves to be an even bigger challenge. Why? I’ll admit one reason is the technology component. Today’s identity security market can be quite confusing, especially to a new or unsophis...