Skip to Main Content

The Identity Blog

How Corporate Culture Can Make (Or Break) Your Organization

As the entrepreneurial bug bites more people and money floods into technology startups, the buzz about company culture continues to get louder. Whether it’s nap pods, private chefs, indoor tree houses or over-the-top parties, tech companies are pulling out all of the stops in hopes of creating the coolest corporate […]

Charting Uncharted Waters: Comprehensive Identity Governance

Over the past two blogs in this series, I have explored the issues facing identity governance teams with the growing amount of sensitive data stored in files across the organization. Let’s quickly recap where we left off last time when we explored the three key reasons governing access to files […]

Gartner IAM Summit Feet on the Street: The Top 3 Priorities for Identity

Each spring, identity professionals come together for the annual Gartner IAM Summit in London to learn about new trends and vendor solutions, and to network with other like-minded individuals.  This years’ event was rich with insights from Gartner, vendors and organizations who shared their own challenges, solutions and best practices. […]

An Identity Management Case Study: The Race Against Time

It’d be hard to tell if it’s a good news or a bad news situation. You’re the senior vice president of identity and access management at an international financial services enterprise when you’re informed that you’ll be given all of the budget and resources you need to transform the identity […]

The Importance of Governing Access to Data Stored in Files

According to Gartner*, upward of 80 percent of enterprise data today is unstructured. ‘Unstructured’ data refers to files like spreadsheets, presentations, documents, PDFs or other user-generated content that is typically stored in unstructured systems like a file share or cloud storage application like Box or Dropbox. As the modern enterprise […]

The Power of Choice

Choice. It’s something we practice each and every day. As consumers, we make choices when accepting a new job, buying a car, building a home, or even purchasing a new phone or laptop; and these choices are based on our requirements.  For instance, it wouldn’t make much sense to purchase […]

Mistaken Identity: The Robots are Coming

Robotic Process Automation (RPA) dominates the discussion in this episode of Mistaken Identity. David Lee and Mike Kiser explore the risks and rewards of the looming robot takeover—and how identity is the key to success in both naval warfare and securing automated bots. Also discussed: valid certificates obtained through stolen […]

A CISO’s View of Successful Identity Governance

In a modern enterprise, a CISO’s job is a complicated one. With the increasing risk of cyberattacks, and need for a flexible work environment, security and accessibility are in a never-ending competition. Every organization’s IT infrastructure is different, but most CISO’s would agree that a secure enterprise has a strong […]

A Proposed Maturity Model for Identity Governance and Analytics: Assimilating the Data

“Caminante, no hay camino. Se hace camino al andar.” Wanderer, there is no path. The path is made by walking. At the start, Identity Governance can seem an impossible task—much like pairing socks from a fresh load of laundry, or buying a toilet brush from Amazon, or, as I described […]

ISO and SOC? Alphabet Soup and What It Means for IdentityNow

Today we announced some important news, namely that we’ve completed two information security assessments for IdentityNow, SailPoint’s SaaS-based identity governance solution. We successfully completed an ISO/IEC 27001:2013 certification, and also obtained a SOC 2® Type 2 report with an unqualified opinion. While these letters and numbers sound complicated (and the […]