The Identity Blog

The SailPoint Blog
The Untold Risk of Automatic Remediation of Cloud Access

Authored by: Lori Robinson It’s inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned. This is to be expected due to the high velocity, large volume, and wide variety of changes that are constantly taking place in cloud environments. Even with the most carefully crafted governance framewo...

Three Key Takeaways From Edgile’s Recent Webinar “The Power Behind the SailPoint and Microsoft Partnership”

Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...

We Are With Our Customers Every Step of the Way

The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...

Identity Transformation in the Public Sector

SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to adopt a smarter and more ...

The (Identity Security) Easy Button

Remember the “easy button” from Staples that was all the rage in the workplace a few years ago? Well, I get this question all the time – is there a way to make this any easier, like an “easy button” for identity security? And truth be told, for what we do, the value we provide to customers, there isn’t an “easy button,” at least not in the traditional sense, but we do mak...

Zen and the Art of Identity Security

In the classic book Zen and the Art of Motorcycle Maintenance, a father and son take a cross-country motorcycle trip to connect. While the book is as philosophical as you can get, for today, I want to focus on one concept in the novel that resonated with me and how it applies to our technological innovation, particularly with identity security, in the months to come. The f...

How to Incorporate SaaS Management Into Your Identity Security Program

This blog is part two in a three-part series exploring “What is SaaS Management?” In this installment, we’ll dig into the rise of SaaS and its incremental impact on identity security, and how this impacts IT teams. You can see the first installment of the series here: The Danger of SaaS Sprawl: How Unsecured Apps Compromise Your Security. Speed vs. security. It’s the etern...

Two Speeding Trains: The SaaS Race and Securing Unstructured Data

Remember that age-old SAT question: “if two speeding trains are heading in the opposite directions at different speeds on the same track, how long will it take for them to collide?” In many ways, this feels like the reality of enterprise IT today when it comes to SaaS application adoption. The use of SaaS applications continues to speed up, but the ability for companies to ...

The Implications of Bring Your Own Identity

When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten it, I vowed not to tell him. I stepped away from the lunch table for a few minutes, and as I headed back,...

False Sense of Security

We’ve hit an identity security inflection point over the last few months. This was largely brought about as more organizations paid closer attention to how they were connecting their workers to the systems and data needed do to their job – particularly after last years’ massive pivot to “working from anywhere”. It wasn’t just a keener eye on how efficiently workers were giv...