Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...
The Identity Blog
The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...
SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to adopt a smarter and more ...
Remember the “easy button” from Staples that was all the rage in the workplace a few years ago? Well, I get this question all the time – is there a way to make this any easier, like an “easy button” for identity security? And truth be told, for what we do, the value we provide to customers, there isn’t an “easy button,” at least not in the traditional sense, but we do mak...
In the classic book Zen and the Art of Motorcycle Maintenance, a father and son take a cross-country motorcycle trip to connect. While the book is as philosophical as you can get, for today, I want to focus on one concept in the novel that resonated with me and how it applies to our technological innovation, particularly with identity security, in the months to come. The f...
This blog is part two in a three-part series exploring “What is SaaS Management?” In this installment, we’ll dig into the rise of SaaS and its incremental impact on identity security, and how this impacts IT teams. You can see the first installment of the series here: The Danger of SaaS Sprawl: How Unsecured Apps Compromise Your Security. Speed vs. security. It’s the etern...
Remember that age-old SAT question: “if two speeding trains are heading in the opposite directions at different speeds on the same track, how long will it take for them to collide?” In many ways, this feels like the reality of enterprise IT today when it comes to SaaS application adoption. The use of SaaS applications continues to speed up, but the ability for companies to ...
When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to tell him. I stepped away from the lunch table for a few minutes, and as I headed back,...
We’ve hit an identity security inflection point over the last few months. This was largely brought about as more organizations paid closer attention to how they were connecting their workers to the systems and data needed do to their job – particularly after last years’ massive pivot to “working from anywhere”. It wasn’t just a keener eye on how efficiently workers were giv...
If you hopped into a time machine and followed SailPoint’s journey in the last 15 years, you’ll see that our approach to innovation has been integral in how we’ve constantly evolved identity security. Our goal is to meet and exceed our customers’ pressing identity needs year after year. It’s one of the main things that drew me to SailPoint when I joined the team last spring...