Authored by Stephen Bradford, SVP EMEA, SailPoint It was in GoldenEye that ‘M’ (a very modern incarnation played by Judi Dench), derided Bond as a ‘relic of the Cold War’ and a ‘dinosaur.’ Her sobriquet of Bond is likely something he wore with pride but let’s face it—the Bond incarnations of Connery, Moore, Lazenby, and Craig have not kept up with their computer skills. T...
Market Views
On this episode of Mistaken Identity, Mike Kiser is joined by Katherine Teitler, VP of Research and Advisory at TAG Cyber. Her recent research illustrates the shifting role of identity—from an IT process to a foundational approach for security. While that’s the starting point, the conversation roams into disinformation, “sources of truth,” identity profiling via personal mu...
Authored by: Casey Herman, PwC Partner, ESG Leader; Brad Bauch, PwC Principal, Advisory; and David Manks, SailPoint Technology Alliances & Partner Marketing If there was any doubt about the importance of cybersecurity in the utility industry, one needs simply to look at the recent news. Already this year, there have been two major breaking stories: In May, a cyberattack sh...
It’s undeniable, the world has seen some major changes over the past year. Many of these changes have directly affected enterprises’ security needs. As the world evolves, SailPoint continues to display a strong understanding of existing and emerging challenges across the security landscape solidifying its position as the overall market leader in KuppingerCole’s 2021 Leaders...
Authored by: Lori Robinson It’s inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned. This is to be expected due to the high velocity, large volume, and wide variety of changes that are constantly taking place in cloud environments. Even with the most carefully crafted governance framewo...
Authored by: Eric Yuan, Vice President, Global Strategic Partners, SailPoint Detecting risk in an organization is harder than ever before. With a mostly virtual workforce accessing, creating, and storing company and customer confidential information both locally and in cloud storage solutions, the threat surface is more expansive than ever before. Sure, IT has risk monitor...
Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...
This blog is the final installment of our three-part series exploring “What is SaaS Management?” In this post, we’ll look at how gaining total visibility and control of all access is essential in today’s enterprise — both for reasons of efficiency and security. Check out part 1 of the series,“The Danger of SaaS Sprawl: How Unsecured Apps Compromise Your Security.” You can c...
The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...
SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to adopt a smarter and more ...