The world enterprises operate in today is not static—it is profoundly dynamic. Workforces are in constant flux, applications multiply into the thousands, and digital workers now outnumber human workers many times over. In this environment, the long-standing disconnect between identity and security can no longer be tolerated. At SailPoint, we believe the only way forward is...
Insights and thought leadership
The setup Back in those golden years between the 2000s and the 2010s, I was working at a healthcare management company that acquired ambulatory surgery centers and hospitals. We needed a scalable identity and access management (IAM) solution to manage identities and access across 160+ medical facilities in 20+ states. Our existing AD-based solution wasn't cutting it with t...
The recent Scattered Spider cyberattacks targeting UK-based retailers, and the subsequent arrest of several British teenagers, have sparked alarm across industries. What is particularly unsettling about these attacks isn’t just the group’s success in infiltrating well-defended systems, but how they did it: not through exotic zero-days or nation-state funding, but through ca...
Your coding AI agent just erased your production database. Oopsie! It also fabricated fake users, falsified test results, and confessed that it ‘panicked’—then made things worse. A CEO confirmed that their AI agent, meant to help developers, did all of the above. It was just supposed to help code faster. Oopsie! An AI agent downloaded from a public prompt-sharing site q...
Welcome back to the Facepalm Files! In this installment, Identity Strategist Rob Sebaugh shares his real-world encounter with a compliance violation risk at the doctor's office. Catch up on part 1. The setup My daughter turned 18 recently, officially aging out of pediatric care. As part of her "welcome to adulthood" experience, she needed to establish care with a new prim...
In this final installment of our three-part series, we explore the third pillar of multi-tenancy: innovation. In Part 1, we showed how a well-architected multi-tenant SaaS model enhances security. In Part 2, we examined how that same architecture enables massive, efficient scalability. Now, we turn to how multi-tenancy fuels rapid, sustainable innovation — helping SailPoin...
Where identity experts share the “a-ha”s behind the “uh-oh”s Everyone has a facepalm‑worthy story—yes, even the pros. In our new Facepalm Files series, identity practitioners and experts share the cringeworthy, laugh‑out‑loud, and occasionally disastrous identity security missteps they’ve experienced or witnessed. Each story comes with a dose of humility, a touch of humor,...
Scaling smart: Why multi-tenancy is built for growth In the first part of this series, we explored how multi-tenancy strengthens security through rigorous tenant isolation, centralized controls, and built-in resiliency. Now, we turn our focus to the second pillar: scale. Enterprise SaaS platforms don’t just need to be secure — they need to perform consistently and grow ef...
In cybersecurity, we’ve made a dangerous compromise. We’ve allowed identity context, security context, and data context to live in silos, each optimized for its own corner of the enterprise, but collectively blind to the bigger picture. That fragmentation may have been tolerable five years ago, but today, it’s a liability. What do we mean by “context”? Simply put, context...
Why multi-tenancy is more than a technical choice In today’s enterprise software landscape, multi-tenancy isn’t just a technical detail — it’s the architectural engine driving the success of leading SaaS platforms like SailPoint’s Identity Security Cloud. By design, multi-tenancy allows a single software instance to securely serve multiple organizations while maintaining ...