Organizations today exist in a state of transition. It’s what many are referring to as ‘Digital Transformation’. While it may manifest differently for organizations, there is one thing that is certain, in order to stay relevant and maintain a competitive advantage, organizations are having to adopt new technologies and business practices. However, like any other transformation, this doesn’t happen overnight. This means organizations will find themselves with an infrastructure that consists of legacy applications alongside new cloud based solutions. Data resides in multiple locations and users (employees, contractors, vendors, and partners) are accessing it from devices both inside and out of a secure corporate network.
This state of transformation creates new exciting opportunities for both organizations and cyber criminals alike. Organizations realize the benefits of supporting a global and mobile workforce while cyber criminals are jumping at the opportunity to compromise accounts and rummage through corporate networks for ‘digital gold’.
53% of business execs experienced a cyber attack in the past year – Insurance Journal
IT and security operations seeking to tightly secure their networks have never had a more difficult task. Many lack complete visibility and controls over user access to their disparate corporate resources; leaving them vulnerable and exposed.
The good news is that there are organizations who have taken on their digital transformation in a mindful way. These organizations have instituted a strong identity governance program, creating an ‘identity-aware’ infrastructure; providing tight controls over user access and safeguarding access to sensitive information. Creating an ‘identity-aware’ infrastructure helps ensure the interconnectivity of all IT and Security resources by sharing identity related information or ‘identity context’. By protecting your infrastructure and managing users and their digital identities, you gain fine-grained visibility and control over what they can access based on their role and responsibilities.
To help in the pursuit of a secure digital transformation, SailPoint provides an open identity platform, making it possible for organizations to govern access to resources – regardless if found on-premises or in the cloud.
With the latest release of IdentityIQ 7.2, SailPoint continues to extend the Open Identity Platform making it easier to apply identity governance across all users, data and applications in digitally transforming environments.
New innovations include:
- Expansion of the Open Identity Platform APIs, allowing IdentityIQ’s robust governance policies and workflows to be accessed as a “shared service”, allowing for critical governance capabilities such as enforcing SoD policies, access requests approvals and other critical identity related information such as roles and entitlements to be leveraged from within solutions that help support an identity-aware eco-system.
- An open Multi Factor Authentication framework which allows advanced security and authentication controls to be implemented using an organization’s preferred MFA solution provider. Current certified MFA vendors include Duo, RSA SecureID, and Microsoft Azure.
- Globalization of extensible plug-in and integration framework provides localized and seamless continuity for multi-national organization efforts to support a user-centric security approach.
- New task management console that provides administrator with centralized view of all the tasks in IdentityIQ and the ability to diagnose and take action on a task if needed
With continued innovation investments such as Privileged Account Module integrations, extensible plugin frameworks and additional open integrations with access management or SSO vendors, SailPoint continues to be a trusted provider of identity governance helping organizations to securely navigate their continued digital transformation journey.
For more information on IdentityIQ 7.2 please read the press release.