The 2023 RSA Conference in San Francisco showcased cutting-edge developments in the cybersecurity landscape, focusing on the potential and challenges Large Language Models (LLMs), the increasing importance of identity as the new perimeter for cyber defense, and the cybersecurity imperative for national defense. In this blog, I’ll be diving into the three key themes that eme...
Insights and Thought Leadership
Without identity security, there is no enterprise security. The companies who rally behind this statement are the ones who stay out of the headlines. They remain protected. They drive down risk. They drive up business agility. This creates acceleration and energy across their business. And ultimately, this empowers the entire workforce to rally behind the business, driving...
Enterprises have a lot invested in their legacy identity security solutions, so it comes as no surprise when they may resist the idea of migrating to a modern solution. It can be difficult to convince stakeholders across the organization to turn their backs on the time and money already spent in maintaining the complex web of integrations that comprise the enterprise’s iden...
CISOs are busy. They are in a mad dash to secure their enterprise while juggling an overwhelming number of competing priorities, budgets, driving efficiencies, all while evolving the digital ecosystem to match pace with the speed of innovation and change happening across the business. So, if you get a moment of their time, you better make it count. We were able to sit down...
At SailPoint, customer success is critical to us, especially in our largely SaaS world, and partners play a significant role in helping drive that. Partners driving the right behaviors, not just sourcing opportunities or transacting opportunities but, more importantly, implementing our products and helping our customers get up and running quickly. SailPoint Partner Fleet is...
Authored by Ana Hilstad, Senior Product Marketing Manager Historically, identity security was not discussed on an executive level. But thankfully, that has changed. This shift was apparent throughout the sessions on the expo hall floor and in many of SailPoint’s customer conversations held at the Gartner IAM Conference two weeks ago. The added focus on identity security a...
Authored by Adam Creaney, Senior Manager, Solutions Development Core to comprehensive Identity Security is the timely and efficient modification of access when required. SailPoint provides direct provisioning capabilities to our customers’ most critical enterprise applications. Still, we also recognize that many tools require manual intervention within the modern Informati...
I love the rodeo. I said it. I love everything about the rodeo. From the livestock shows to the food vendors, the shopping, the concerts, and especially the rodeo events. Every year, as soon as my family gets our tickets, it feels like Christmas has come early, and I start counting down the days until we go. While I love the rodeo, I am also amazed by it. Every night for ab...
Authored by Mike Conti, Product Marketing Manager To increase flexibility and boost competitiveness, organizations have eagerly embraced a growing diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level of managing...
Authored by Cameron Wilson, Product Marketing Manager Even though the pandemic made it feel like time is a flat circle, this is not true, especially regarding access controls, for which timing is vital. So what are access controls, you ask? Access controls certify authentication (users are whom they state they are) and authorization (they have suitable access to company da...