The Identity Blog

The SailPoint Blog
Investing in digital identity is essential: The costs of inaction are high

Authored by Jaishree Subramania, Vice President of Product Marketing In mylast blog covering our Horizons of Identity Security research report, I touched on the five distinct horizons of identity security and the key enablers that determine where an organization sits in its identity journey. Today, I’ll touch on another aspect of the report: why investing in identity secur...

Gain value on day 1: AI-derived decision support for your identity security program

Authored by Kelly Grizzle, Distinguished Engineer The digital landscape is changing quickly. The number of apps in use by the average enterprise increased by 20% in 2020, according to a recent Netskope threat report. Organizations with 500-2,000 employees now use approximately 700 cloud apps monthly. Data shows us that security teams manage access to hundreds of applicatio...

Key takeaways from the state of identity security 2023: a spotlight on healthcare

This week, SailPoint released a new report titled The State of Identity Security 2023: A Spotlight on Healthcare. The report examines what identity security looks like in the healthcare industry today, particularly in the face of continuing challenges, including chronic staffing shortages, the ongoing increase in malicious cyberattacks against providers, and the growing num...

What identity can learn from the Blob

What limits the size of a city? It’s not a particular industry, nor is it a favorable setting. What limits the size of a city is the speed of its transportation. As innovation accelerated transport, cities grew larger; people could range further for school, work, and community. But even this new growth, it created a new set of problems caused by the sheer scale of the urba...

SailPoint interactive demos: seeing is believing

As a leading provider of identity governance solutions, we understand the importance of demonstrating the value and capabilities of our products to existing and potential customers. That’s why we offer interactive demos to showcase how our identity security platform can help discover, manage, and secure all identities across the modern enterprise. One of the key benefits o...

The identity security journey

Authored by Jaishree Subramania, Vice President of Product Marketing In my last blog, we looked at the four major elements defining the future of identity security – derived from our 2022 Horizons of Identity Security research study. While it may take some time to reach different aspects of this future, we do know that all companies are on a journey to get there – even tho...

Delivering a comprehensive approach to identity security

One of the things that really energized me when thinking about our next chapter under Thoma Bravo was the promise of accelerated innovation to the benefit of our rapidly growing enterprise customer base. You’ll see us make some moves in 2023 (and beyond) to increase our velocity of innovation, delivering transformative value in identity security. Today is one step forward ...

Essentials of Joiner-Mover-Leaver Functions

Authored by Jerry Aubel, Senior Product Marketing Manager Imagine this – You’re attending the Identity Security equivalent of the Oscars. Anticipation is palpable as the host begins to announce the winner of the coveted “Identity Process of the Year” award…and the winner is Joiner-Mover-Leaver! Perhaps that’s a geek pipedream. But even if joiner-mover-leaver (JML) policie...

Vodafone Turkey Strengthens Their IAM Program with SailPoint

Authored by Nataliia Gnatiienko, Customer Marketing Manager Vodafone operates mobile and fixed networks in 21 countries and partners with mobile networks in 48 more. As of June 2022, the company had over 300 million mobile customers, more than 28 million fixed broadband customers, and 22 million TV customers. Vodafone is a world leader in the Internet of Things (IoT), conn...

The Future of Identity Security: Four Major Elements

Authored by Jaishree Subramania, Vice President of Product Marketing Earlier this year, we conducted research surveys across the globe that culminated in our Horizons of Identity Security Report. During this project, identity security decision-makers from across the world helped us clearly define five horizons of identity security programs, from beginning to advanced. Usin...