The Point - The SailPoint Blog

Steak Dinner for Your Data?

I’ve been at the RSA Conference all week, so I just noticed an intriguing news item from The Register on Monday. The article details survey results from an unnamed security vendor, concluding that one-third of workers are open to bribes for data theft. It’s beyond the scope of this blog […]

Watching the Identity Management Sun Set

Most of us were surprised yesterday to hear Oracle’s intentions to acquire Sun. What does this announcement mean for the IdM space? While Oracle has taken out one of its chief competitors in the IdM suite business as a by-product of the acquisition, it has done so at the cost […]

Virtualizing an Identity Appliance

These days I spend a lot of time on the road talking to customers, prospects, and business partners. I’m fortunate to spend time with some of the smartest people in the industry and hear about the kinds of projects that are still being funded in troubled times. Of all of […]

Verizon Business Report: Data Breaches Can Be Avoided

Verizon Business just posted the results of their 2009 Verizon Business Data Breach Investigations study this morning. This is Verizon Business’ second annual study, and it highlights some interesting – and unfortunately not surprising – statistics. Of the 285 million compromised records that Verizon studied, 93 percent occurred in the […]

SailPoint Simplifies the Process of Buying and Deploying Identity Management

Last week, Burton Group analyst Lori Rowland wrote about how the weakened economy has been good for identity management technologies. I agree with Lori – the churn created by the recession has heightened the need for companies to proactively manage risk associated with user access controls. Compliance and identity governance […]

Feet on the Street: Thoughts from Gartner’s IAM Summit in London

This week I’m over in London meeting with customers and partners at the Gartner IAM Summit. Gartner analyst Earl Perkins kicked off a packed conference this morning with his keynote address, “Enabling Governance and Risk Management in an Age of Business Challenges.” A couple of points made by Earl rang […]

Mind the Competence Inversion

Recently, an iGoogle “quote of the day” made me stop and think. Usually, I read the quotes, smirk, and move on. But this one was different:   Technology is dominated by two types of people: those who understand what they do not manage, and those who manage what they do […]

An Identity Report from the Road

For the past several weeks, I’ve been racking up the frequent flier miles, canvassing the identity management marketplace and talking with customers from various industries and geographies. My overwhelming conclusion from these meetings is that the concept of identity governance has rapidly evolved over the last 12 months from an […]

Another Day, Another Breach

Heads up – there’s been another “massive” credit card security breach – the 3rd such incident in recent months. We don’t know which company suffered the breach, but it appears to be another card payment processor. We’re still in the “whisper period” as some call it – Visa and MasterCard […]

Identity Risk Modeling: the Secret Sauce of IT Risk Management

Lately I’ve been talking to a lot of customers and prospects about how to proactively approach risk mitigation with identity-related technologies. In today’s climate, I see an ever increasing need for a new approach to managing identity and the need for a more “directed” focus for the deployment of identity […]