Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...
Insights and Thought Leadership
Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...
Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...
Authored by Jerry Aubel, Senior Product Marketing Manager Automation is an important key to a more efficient Identity Security program. One where you can concentrate more on execution and less on building manual processes. That’s why we are excited to talk to you about SailPoint Identity Security Cloud SaaS Workflows. SaaS Workflows can automate and orchestrate less defina...
Nobel prize-winning author John Steinbeck once said, “…to find where you are going, you must know where you are.” Having a starting point in whatever journey you are undertaking is vital as the path forward starts from there. In the case of our world, identity security for large, complex enterprises – it’s not about a distinct start and end point. It’s not one-and-done. It...
By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...
Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...
When the pandemic took root back in 2020, companies moved to triage mode in order to rapidly become a 100% virtual workforce. The most pressing item on their list: get everyone access to everything they need to be productive on the job from home. Not only was the shift swift, it also created a significant margin for error when it came to the security of the business becaus...
Authored by Jerry Aubel, Senior Product Manager “Audit time and the living is easy!” I suspect the thought of the following access certification review doesn’t have you whistling down the hall, but it doesn’t have to be a burden. User access certification is a critical process for any enterprise. Automating it can make it easy for Identity teams and the business to meet re...
Automation is key to scaling identity security. With so much data, there are not enough experts and resources to keep up with and keep track of every intertwining workstream and application that cross different identities. It has moved far beyond human capacity at this point. At SailPoint, automation is one of the core pillars of our products. We aim to free up time so our ...