The Identity Blog

The SailPoint Blog
Introducing the SailPoint Partner Fleet program

At SailPoint, customer success is critical to us, especially in our largely SaaS world, and partners play a significant role in helping drive that. Partners driving the right behaviors, not just sourcing opportunities or transacting opportunities but, more importantly, implementing our products and helping our customers get up and running quickly. SailPoint Partner Fleet is...

Voices of experience – Industry trends driving the need for Identity and Access Governance (IGA)

From digital transformation to cloud computing to the Internet of Things, to employees using their own devices and working remotely worldwide, today’s organizations need to manage more IT connections across more devices from more places. Yet all these “things” accessing other “things” increases the security risk and the possibility that malicious actors will gain unapprove...

Identity security enabling enterprises

Authored by Ana Hilstad, Senior Product Marketing Manager Historically, identity security was not discussed on an executive level. But thankfully, that has changed. This shift was apparent throughout the sessions on the expo hall floor and in many of SailPoint’s customer conversations held at the Gartner IAM Conference two weeks ago. The added focus on identity security a...

Voices of experience – Why IT leaders consider identity security essential to their business

When is cyber security not just security? When it’s identity security. While good cyber security is critical for protecting data and avoiding online attacks and hacks, some security solutions can deliver increased security and much more. In fact, identity security enables a broad range of values beyond basic access management that many organizations consider it a business ...

SailPoint and Atlassian Jira Service Management

Authored by Adam Creaney, Senior Manager, Solutions Development Core to comprehensive Identity Security is the timely and efficient modification of access when required. SailPoint provides direct provisioning capabilities to our customers’ most critical enterprise applications. Still, we also recognize that many tools require manual intervention within the modern Informati...

Roping in identity security threats with SailPoint solutions

I love the rodeo. I said it. I love everything about the rodeo. From the livestock shows to the food vendors, the shopping, the concerts, and especially the rodeo events. Every year, as soon as my family gets our tickets, it feels like Christmas has come early, and I start counting down the days until we go. While I love the rodeo, I am also amazed by it. Every night for ab...

Top 10 signs your approach to non-employee identity management needs improvement

Authored by Mike Conti, Product Marketing Manager To increase flexibility and boost competitiveness, organizations have eagerly embraced a growing diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level of managing...

Time is of the essence: How reactionary access risk management can lose you money and reputation

Authored by Cameron Wilson, Product Marketing Manager Even though the pandemic made it feel like time is a flat circle, this is not true, especially regarding access controls, for which timing is vital. So what are access controls, you ask? Access controls certify authentication (users are whom they state they are) and authorization (they have suitable access to company da...

Enterprise security through the right lens

Have you ever stopped to look at something and thought, “Hm, that doesn’t look right”? Maybe it’s the painting hanging on the wall in your living room and you notice it’s slightly off-center one day as you’re packing up to leave for work. Or maybe it’s the project at work you’ve been working on for months, and you’ve hit a standstill. You step back and revisit all the wor...

Investing in digital identity is essential: The costs of inaction are high

Authored by Jaishree Subramania, Vice President of Product Marketing In mylast blog covering our Horizons of Identity Security research report, I touched on the five distinct horizons of identity security and the key enablers that determine where an organization sits in its identity journey. Today, I’ll touch on another aspect of the report: why investing in identity secur...