Skip to Main Content

The Identity Blog

7 Critical insights on identity security: A 2023 survey 

The ever-evolving digital landscape demands a shift in how companies approach identity security. This past fall, we surveyed more than 375 identity security decision-makers from companies globally. The findings? A treasure trove of insights to navigate today’s identity challenges. Here’s what we discovered:  1. The business case for identity security […]

Pillars of the NIS2 Directive: Recommended risk management measures 

Authored by Sebastien Lelarge, Sales Engineer The EU’s NIS2 came into effect in December 2022, with member states given until October 2024 to adopt the new regulation.   But what does this really mean?  It means that businesses must prioritize compliance to safeguard against cyber threats.   The original NIS Regulations apply […]

Streamline healthcare processes with better Non-Employee Risk Management

Authored by Michael Conti, Product Marketing Manager I recently had a chance to sit down with two of our customers in the healthcare industry to discuss the increasingly important challenges of managing non-employees within their organizations and how they’re solving that critical problem.  For most organizations, there’s no doubt that […]

Why you should migrate from IdentityIQ to SailPoint Identity Security Cloud  

 Authored by Chris Gossett, SVP, Technology Services  On-premises solutions can give you control of all your infrastructure and the power to customize your configurations. While powerful, on-premises solutions have their limits and can impact budgets, resource consumption, availability, scalability, and more. For example, organizations may struggle to find appropriate staff […]

SailPoint Identity Security Cloud: Most common questions

For many organizations, the cloud is the future. As applications, databases, and services shift to cloud platforms, it means security must also. Luckily, any organization already invested in SailPoint IdentityIQ on-premises identity management solutions has a head start. They can migrate almost seamlessly to SailPoint Identity Security Cloud, maintaining work […]

10 months later and 10 reasons to celebrate SailPoint’s Non-Employee Risk Management solution 

Authored by Michael Conti, Product Marketing Manager The ten months since SailPoint acquired SecZetta have flown by. As a SecZetta employee turned SailPoint crew member, I’ll never forget the day we were acquired…it was a whirlwind of exhilaration and the start of a thrilling new chapter. It’s been a remarkable […]

‘Tis (always) the season of giving at SailPoint

With the holiday season near, it’s natural to express gratitude by giving back to the community. But at SailPoint, giving back is woven into the fabric of our culture. We don’t just donate our time and resources when the holidays roll around – our crew finds ways to give back […]

Driving deeper insights, more automation, and better visibility into your IGA program

Authored by Ana Hilstad, Senior Product Marketing Manager The attack surface for organizations is exponentially growing as the number of applications, types of identities, and complexity of their unstructured data continue to rise. According to a recent industry report, governing access manually, often across dozens of disparate systems, without the […]

SailPoint Navigate 2023 and Foster Village partnership

This year marked our eleventh year for our annual Navigate conference. Filled with exciting product announcements, innovative ideas and insightful guest speakers, Navigate 2023 was one for the books. But what made this year’s event even more special was our partnership with Foster Village.  You might be wondering, what is […]

State Of Data Access Governance Report shows organizations struggle with data security and compliance 

Authored by Eric Zimmerman, Product Marketing Manager When adequately secured, expertly analyzed, and appropriately shared, enterprise data is a business accelerant. But as more data is created and stored, the potential attack surface grows – and companies struggle to adequately secure their critical data assets – leaving them exposed to […]