The Identity Blog

The SailPoint Blog
Reimagine identity security with AI: Intelligent access. Resilient security.

In today’s complex enterprises, identity security has become the cornerstone of a sound cybersecurity strategy. As organizations scale across cloud platforms and hybrid work models, managing who has access to what—and ensuring that access is appropriate—has never been more critical. Our latest insights reveal how artificial intelligence (AI) and machine learning (ML) are re...

SailPoint Identity Security Cloud is GovRAMP Authorized: Expanding our commitment to the public sector

We are thrilled to announce that SailPoint Identity Security Cloud has achieved GovRAMP Authorization, a significant milestone that underscores our dedication to providing secure and verified identity security solutions for public sector organizations. Our authorization includes essential capabilities for Non-Employee Risk Management, Machine Identity Security, and Data Acc...

The power of running with real-time signals: Continuous identity at Identiverse 2025

On September 17, 2011, I was reminded that obtaining and reacting to real-time data is essential. I was running the Stockholm Half Marathon and desperately trying to pace myself on a course that I had never run before. My goal was to keep close to 5 minutes per kilometer (8 minutes per mile)—and the Garmin on my wrist was continually giving me feedback in real-time. It's...

SailPoint Cloud Infrastructure Entitlement Management (CIEM) named a Leader in KuppingerCole’s latest CIEM report

We’re proud to announce that SailPoint has been named an Overall Leader in the 2025 KuppingerCole Leadership Compass for Cloud Infrastructure Entitlement Management (CIEM)—a recognition further solidifying our position as a market leader in identity-as-a-service (IaaS) identity security. KuppingerCole’s CIEM report evaluates the top vendors in cloud infrastructure entitlem...

Accelerating application onboarding with Application Management

Application onboarding is a decades-old problem that no identity security vendor or partner has been able to solve very well. The fundamental challenge is that customers often have hundreds or thousands of applications which need to be connected to and integrated with their governance product. Even the most user-friendly integration patterns require some level of technical ...

The hidden risk in automation: Why Machine Identity Security is essential

By Parminder Kocher and Hari Patel In business, automation is ubiquitous. Machines, bots, and APIs are working behind the scenes—connecting applications, processing data, and driving efficiency at a scale no human workforce could match. But there’s a problem: these machine identities often go unmanaged, creating security gaps that organizations don’t even realize exist. I...

Identity at the helm: Why cyber resilience starts with modern identity security

Imagine you're the captain of a massive ship. On calm seas, your vessel feels invincible. Yet lurking beneath the surface are hidden currents, submerged hazards, and sudden unexpected storms. You can't stop the waves—but you can design a ship resilient enough to withstand anything the ocean delivers. Cyber risk is no different. Threats are inevitable—but the real measure o...

Unlock smarter governance with automated data ownership election

Find the right data owners for your organization’s sensitive information How do you know who should have access to sensitive data if your organization struggles to identify who owns it in the first place? Well, it’s hard. In fact, it’s nearly impossible to secure access to business-critical information when you don’t first know who owns that data. This is why we built Sai...

Lost ships in the fog: the hidden machine identity problem

Imagine you're a lighthouse keeper responsible for tracking all the ships in your waters. Every night you scan the horizon, ensuring every vessel is accounted for and safely navigating the channels. But by morning, new ships have appeared—unregistered, untracked, and moving through the fog without warning. Where did they come from? How many more are out there beyond your li...