The Point - The SailPoint Blog

Another Leap for SailPoint with the Acquisition of ERP Maestro

SailPoint recently shared the exciting news of our acquisition of Intello. Today, I’m thrilled to share another step forward with the acquisition of ERP Maestro.   From CISOs to identity and security practitioners alike, everyone I talk to knows this: there is no shortage of risk facing today’s cloud enterprise. […]

Why SailPoint? Maximus Explains

Meet SailPoint customer, Maximus. Maximus partners with state, federal and local governments to provide communities with critical health and human service programs. When Maximus conducted a general assessment of their environment, they discovered that they needed to build a formal identity program and reduce risk in highly privileged areas. Maximus […]

Announcing SailPoint for Microsoft Teams: Adapting identity security to help your employees be more collaborative anywhere

Maintaining a feeling of teamwork and enabling productivity in almost any environment is more important than ever. Work from anywhere is now the new norm and collaboration solutions play an integral part in helping remote teams stay productive. At SailPoint, our focus is on finding innovative ways to help our […]

The Missing Link: Combining Identity Security with Cloud Access Management

The adoption of Infrastructure as a Services (IaaS) is rapidly increasing, with more than 78% of organizations using at least 2 different cloud IaaS platforms. Many organizations have adopted stand-alone Cloud Access Management solutions to monitor their multi-cloud environments, but is that enough? While these solutions are good at providing visibility […]

Get the Most Out of Access Request

Self-Service Access Request is one example of a way that organizations enable new and seasoned employees so they can get the access they require to get their jobs done.  The concept sounds simple, right? Give users a catalog of items to choose from, allow them to submit requests, and carry the request through necessary reviewers before granting the access.   We have found that some Access Request programs fail to reach their full potential due […]

Three Questions with Gina Miller, Reference Program Manager at SailPoint

Gina Miller may be a new SailPoint crew member, but she is right at home. Like many of us, her career path was less of a straight line and more of a winding, scenic road. Let’s break it down real quick – she studied economics and planned to go into finance but instead found herself in the start-up life. […]

What Greek Mythology Can Teach Us About Access Modeling

For fans of Greek mythology, the story of Sisyphus is a bleak example of one assigned to a life of unending, monotonous tasks.    Sisyphus ran afoul of Zeus one too many times and was assigned the grueling punishment of forever rolling a massive boulder up a hill. Every time Sisyphus […]

Mr. Cooper’s Identity Governance Team Wins Big

We love to celebrate our customers! Mr. Cooper’s Identity Governance Team was named the Cybersecurity Team of the Year for the 2021 Cybersecurity Excellence Awards. They were tasked with replacing their homegrown identity tool with an automated program built on SailPoint. Only catch? They had to do it in just […]

How we designed a scalable and extensible framework for bringing event-driven integrations to our customers

Event Driven Integration with SailPoint  Many modern software architectures are implemented using event-driven programming. An event-driven program is designed to receive and react to events such as user clicks in a UI, object changes in a database, or messages originating from other subsystems in a distributed architecture. A state owner […]

Improve Process Automation using SailPoint and Amazon EventBridge

These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data that it […]