The Identity Blog

The SailPoint Blog
Improve Process Automation using SailPoint and Amazon EventBridge

These unprecedented times have impacted almost every organization and forced them to accelerate their digital transformation. This acceleration has also put additional strain on IT resources. This digital transformation, the changing workforce, and an ongoing wave of compliance and security requirements have introduced so many users, points of access, applications and data ...

Two Steps Forward: A Momentous Time for SailPoint with the Acquisition of Intello

If you hopped into a time machine and followed SailPoint’s journey in the last 15 years, you’ll see that our approach to innovation has been integral in how we’ve constantly evolved identity security. Our goal is to meet and exceed our customers’ pressing identity needs year after year. It’s one of the main things that drew me to SailPoint when I joined the team last spring...

Three Ways Identity Security Protects Critical Infrastructure for Utilities

Author: Rob Wilson Modern-day utilities look nothing like they did 20 years ago. While they still provide critical services to homes, businesses and communities, digitalization and decentralization have reshaped the industry from being traditionally cautious to one that’s digitally savvy and open to change. Along with addressing ever-evolving regulatory requirements such ...

Country Financial Re imagines Identity with Automation

Meet SailPoint customer, Country Financial. Country Financial is a U.S. insurance and financial services company. They set out on their identity journey looking for a solution that would replace their cumbersome manual processes. They needed an identity platform that would help them reach their automation goals and scale with their growing business. With SailPoint, Country...

Philips Leverages Identity to Improve Security Posture

Meet SailPoint customer, Philips. Philips is a leading health technology company focused on improving peoples lives and enabling better outcomes across the health continuum. Identity and security are top of mind for Philips as they make the transformation to becoming a digital company. They needed an identity solution that would not only improve their security posture and r...

Empowering Students With The Power of Identity

Founded in 1819, Norwich University was the first private military college in the United States and the birthplace of Reserve Officer Training Corps (ROTC). The university has over 5,000 students in their undergraduate and graduate programs, which consists of 60% ROTC students and 40% civilian students. The graduate program’s growth has been phenomenal over the past 10 year...

The Identity Management Pendulum: Identity Security Mitigates Access Management Risk

It wasn’t so long ago when it was common to think of identity management as a compliance and enablement tool for large enterprises. The market was borne from a compliance standpoint. Since then, SailPoint has led the evolution of identity into what it is today: foundational to securing and enabling today’s digital cloud enterprise. Today, a large part of the world of identi...

T-Mobile: From Legacy to the Cloud

Meet SailPoint customer, T-Mobile. The well-known global wireless telecommunications service provider was looking to migrate from their legacy identity system while in the middle of a merger and acquisition – a sizable task. To accomplish this, they needed an identity solution that would allow them to execute a seamless migration with minimal disruptions to the business. W...

Millicom: What if Identity Didn’t Exist?

We rely on identity for almost everything, which became even more apparent when organizations had to make the quick shift to a remote workforce. Identity stands at the very core of IT operations and allows organizations to manage security and compliance risks. Now imagine if identity didn’t exist… Long time industry veteran and SailPoint customer, John Masserini, Chief Inf...

SailPoint Achieves ServiceNow Built on Now Platform Status

Over the last several months, we’ve seen years-long digital transformation initiatives accelerated into days and weeks to adapt to a new virtual workforce. As a result, managing user access requirements have grown exponentially and even more complex. Keeping up with these access demands while maintaining security and compliance can be overwhelming for your IT teams. This c...