Skip to Main Content

The Identity Blog

Holland Casino: Working Smarter Using a Governance-based Approach

Holland Casino is a government-owned gaming and entertainment provider in the Netherlands that has over 4,600 employees and contractors. They operate over 14 casinos, and needed an end-to-end identity governance solution to automatically and securely deliver access to their workforce. Holland Casino’s identity journey began in 2010 when an identity […]

Friday Quick Take: Why Healthcare Providers are at Risk of Breach

Identity governance is foundational to any cybersecurity program. However, healthcare providers who only focus their identity governance program across applications, expose themselves to unnecessary risks. No matter how secure your database, sensitive data tends to escape and migrate to unsecured locations. This can lead to serious financial, operational and reputational […]

Mistaken Identity: Spectre, Meltdown, and the Identitrain

2018 is here—with an opening salvo that underscores the need for security in every layer, all the way down to silicon. We delve into the world of Spectre and Meltdown, attempt to explain it with a non-technical analogy, and then explore what it means for both chip vendors and the […]

The Anatomy of a Privileged Account Hack

Thycotic is a SailPoint Identity+ Alliance partner.  This blog post was previously shared on their blog, The Lockdown. Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet […]

Friday Quick Take: Taking Healthcare Cybersecurity Beyond Compliance

Compliance is a term that grabs the attention of almost any healthcare security professional. After all, healthcare is one of the most highly regulated industries in the world. The HIPPA fines alone for non-compliance can cost an organization $1.5 million a year. Given the consequences of non-compliance and the effort […]

Charting Uncharted Waters: The Challenges of Governing Access to Unstructured Data

In the first installment of “Charting Uncharted Waters” we discussed the impact unstructured data is having on identity governance program teams as sensitive data quickly escapes from applications and platforms and comes to reside in a wide-range of file storage systems. In this installment, I will dive “under the water” […]

Sacramento Municipal Utility District: Safely and Securely Enabling Their Workforce

The Sacramento Municipal Utility District (SMUD) is the sixth largest community-owned power company in the United States, servicing more than 600,000 customers in and around Sacramento. They have been recognized as an industry leader and award winner for their innovative energy efficiency programs, renewable power technologies and sustainable solutions for […]

The Importance of Good Identity Management and DevOps

When most people think of DevOps, identity management isn’t usually quick to come to mind. Usually, it’s aspects of software development and IT management such as continuous integration and delivery, application security, or increased collaboration among teams. That’s all spot-on, for sure, as DevOps does all of those things. But […]

Mistaken Identity: Looking Back, Looking Forward

As 2018 arrives, David Lee and Mike Kiser welcome Chief Strategy Officer Kevin Cunningham and Chief Executive Officer Mark McClain as we review what occurred in 2017—and what it portends for the coming year. What has changed in the landscape in the last twelve months? How will identity continue to […]

Rockwell Automation Achieves Significant Savings with SailPoint IdentityIQ

Rockwell Automation faced a looming identity problem. Their legacy system, Sun’s IDM solution, was scheduled to sunset in 2014, so the company had to make a change. Rather than simply replacing one system with something newer, however, Rockwell wanted to get its identity and access management (IAM) program right once […]