BJ’s Wholesale Club has built a robust infrastructure around access and identity rooted in the automation of manual processes. Steve Breton, Senior Manager of Identity and Access Management at BJ’s recently shared his perspective on the impact automation has had. Steve’s primary focus has been on developing automation to help improve the employee experience, especially the...
The Identity Blog
Authored by Katherine Cola With over 100 years of automotive experience, General Motors (GM) is familiar with adapting their business to meet evolving security challenges head-on. Tray Wyman, Director of Identity and Access Management at GM recently shared the important role identity security plays in their organization’s strategy. Minimizing certification fatigue, levera...
As Navigate ‘21 begins today in EMEA, we are thrilled to celebrate a new group of identity security award winners. The competition across our amazing customers was tough, especially considering the heightened focus on identity security strategies coming out of last year. Our customers truly understand the importance of securing digital identities and are energized about tak...
Authored by Frank Briguglio, CISSP | SailPoint Public Sector Strategist Digital transformation and IT modernization are increasing the adoption of cloud data and applications at a pace never seen before. Now, our borders are open to remote users and non-traditional mission partners, which have dissolved traditional network boundaries rendering them ineffective. Today, to b...
Authored by: Lori Robinson It’s inevitable that you will run across a situation where the cloud access configured in your environments is misconfigured or over provisioned. This is to be expected due to the high velocity, large volume, and wide variety of changes that are constantly taking place in cloud environments. Even with the most carefully crafted governance framewo...
Authored by: Gretchen Wichmann, Managing Director at Edgile, Identity Practice Leader Identity programs sit at the center of the modern security strategy. Developing the identity strategy and successfully running identity programs—not projects, but actual, robust programs—remains a top priority for many organizations. This leaves program execution an active assignment in t...
The SailPoint crew is fanatically focused on our customers’ success every step of the way. And our customers choose SailPoint because not only do we actively listen to what they need, we are also with them at every stop of their identity security journey. We help our customers by making a tailor-made program for what works best for their security programs– jumping through ...
SailPoint talked to Jason Corbishley, CISO, Police Digital Service; and Kurt Frary, Deputy Director of Information Management & Technology / CTO Norfolk County Council, about what identity management means to them. Identity is at the heart of access controls. As more and more people choose to work from home, public sector organisations have had to adopt a smarter and more ...
Remember the “easy button” from Staples that was all the rage in the workplace a few years ago? Well, I get this question all the time – is there a way to make this any easier, like an “easy button” for identity security? And truth be told, for what we do, the value we provide to customers, there isn’t an “easy button,” at least not in the traditional sense, but we do mak...
In the classic book Zen and the Art of Motorcycle Maintenance, a father and son take a cross-country motorcycle trip to connect. While the book is as philosophical as you can get, for today, I want to focus on one concept in the novel that resonated with me and how it applies to our technological innovation, particularly with identity security, in the months to come. The f...