Skip to Main Content

The Identity Blog

Gartner IAM Summit Feet on the Street: The Top 3 Priorities for Identity

Each spring, identity professionals come together for the annual Gartner IAM Summit in London to learn about new trends and vendor solutions, and to network with other like-minded individuals.  This years’ event was rich with insights from Gartner, vendors and organizations who shared their own challenges, solutions and best practices. […]

An Identity Management Case Study: The Race Against Time

It’d be hard to tell if it’s a good news or a bad news situation. You’re the senior vice president of identity and access management at an international financial services enterprise when you’re informed that you’ll be given all of the budget and resources you need to transform the identity […]

The Importance of Governing Access to Data Stored in Files

According to Gartner*, upward of 80 percent of enterprise data today is unstructured. ‘Unstructured’ data refers to files like spreadsheets, presentations, documents, PDFs or other user-generated content that is typically stored in unstructured systems like a file share or cloud storage application like Box or Dropbox. As the modern enterprise […]

The Power of Choice

Choice. It’s something we practice each and every day. As consumers, we make choices when accepting a new job, buying a car, building a home, or even purchasing a new phone or laptop; and these choices are based on our requirements.  For instance, it wouldn’t make much sense to purchase […]

Mistaken Identity: The Robots are Coming

Robotic Process Automation (RPA) dominates the discussion in this episode of Mistaken Identity. David Lee and Mike Kiser explore the risks and rewards of the looming robot takeover—and how identity is the key to success in both naval warfare and securing automated bots. Also discussed: valid certificates obtained through stolen […]

A CISO’s View of Successful Identity Governance

In a modern enterprise, a CISO’s job is a complicated one. With the increasing risk of cyberattacks, and need for a flexible work environment, security and accessibility are in a never-ending competition. Every organization’s IT infrastructure is different, but most CISO’s would agree that a secure enterprise has a strong […]

A Proposed Maturity Model for Identity Governance and Analytics: Assimilating the Data

“Caminante, no hay camino. Se hace camino al andar.” Wanderer, there is no path. The path is made by walking. At the start, Identity Governance can seem an impossible task—much like pairing socks from a fresh load of laundry, or buying a toilet brush from Amazon, or, as I described […]

ISO and SOC? Alphabet Soup and What It Means for IdentityNow

Today we announced some important news, namely that we’ve completed two information security assessments for IdentityNow, SailPoint’s SaaS-based identity governance solution. We successfully completed an ISO/IEC 27001:2013 certification, and also obtained a SOC 2® Type 2 report with an unqualified opinion. While these letters and numbers sound complicated (and the […]

Friday Quick Take: Securely Enabling Government Employees

We often hear of employee churn in the federal government, particularly as new administrations take office. Hear from SailPoint’s Chief Strategy Officer Kevin Cunningham on Federal News Radio on how the power of identity allows agencies to manage this turnover and enable their employees to be productive and secure from day one.

Mistaken Identity: Clear Eyes, Full Data, Can’t Lose

Ok, so you have the largest data lake in the hemisphere, but now what do you do with it? David Lee and Mike Kiser welcome Gianni Aiello to explore how big data can be triaged even while the first few rounds of analytics begin to surface answers to pressing questions. […]