Authored by Jerry Aubel, Senior Product Marketing Manager Think fast: what’s the most critical element of a robust Identity and Access Management strategy? Ask any security team, and I’ll wager that their answers will be all over the map. One key element that’s sometimes overlooked is password management. But take a closer look, and you’ll likely agree it’s a critical cap...
The Identity Blog
Managing cyber security for an organization is an ongoing process that evolves as an organization’s infrastructure, applications, technology, and user base evolves. For many organizations, cloud is an important part of that evolution. Some organizations have gone fully to the cloud with applications and data; others are still wholly on-premises, while many others are somew...
Authored by Anonymous SailPoint Employee Before joining SailPoint, I worked at a B2B company for just over a decade. I loved my time there, and I still have nothing but the fondest of feelings for the organization, the people I worked with, and the work we did together there. And, let me tell you, it’s a good thing that I don’t have an iota of bitterness or negative feeli...
The 2023 RSA Conference in San Francisco showcased cutting-edge developments in the cybersecurity landscape, focusing on the potential and challenges Large Language Models (LLMs), the increasing importance of identity as the new perimeter for cyber defense, and the cybersecurity imperative for national defense. In this blog, I’ll be diving into the three key themes that eme...
Most companies do not doubt that implementing identity and access governance in their organization might be a good idea. But what’s the best way to do it? By following the advice of those who have gone before. Specifically, at Navigate 2022 in London, IT leaders from various industries recently shared their best practices for initiating an identity and access governance pr...
Without identity security, there is no enterprise security. The companies who rally behind this statement are the ones who stay out of the headlines. They remain protected. They drive down risk. They drive up business agility. This creates acceleration and energy across their business. And ultimately, this empowers the entire workforce to rally behind the business, driving...
One thing we are proud of at SailPoint is our global footprint. From Europe, to America, to APAC, our capabilities, our customer base, and our talent. Today, we wanted to take a moment to highlight our crew in Latin America. Kate Cox, senior manager of engineering, sat down with Mark McClain, CEO, and Raul Carbajal, director of engineering, to talk about SailPoint and its ...
Regardless of what industry you’re in, identity security must be a component of your overall cyber security strategy. Identity security is a critical line of defense against cyber threats, enabling the management and governance of access for every digital identity in an organization. Digital identities, such as email addresses or login credentials and pin numbers, are uniq...
Enterprises have a lot invested in their legacy identity security solutions, so it comes as no surprise when they may resist the idea of migrating to a modern solution. It can be difficult to convince stakeholders across the organization to turn their backs on the time and money already spent in maintaining the complex web of integrations that comprise the enterprise’s iden...
CISOs are busy. They are in a mad dash to secure their enterprise while juggling an overwhelming number of competing priorities, budgets, driving efficiencies, all while evolving the digital ecosystem to match pace with the speed of innovation and change happening across the business. So, if you get a moment of their time, you better make it count. We were able to sit down...