Perspectives du marché

Zero Trust in the Digital Transformation Age

In the digital transformation age, enterprises are shifting from traditional perimeter security approaches to the Zero Trust framework to protect their most sensitive networks. Centered on the belief that organizations should not automatically trust anything inside or outside their perimeters, this model demands that they verify anything and everything trying […]

2019 Market Pulse Survey: If Time is Money, Then Identity Pays

Consider this. You are an IT leader at an enterprise organization. You have not been living under a rock, and therefore are well aware that companies across the world struggle with cybersecurity. Whether its teaching employees how to spot a potential phishing attack or dealing with the fallout from a […]

What’s the Key Enabler for Security Incident Response?

A modern Security Incident Response solution is a system of interconnected components working together to identify known and unknown threats and to prevent or limit the damage done by those threats. The method for addressing those threats loosely follows the NIST Cybersecurity Framework Functions – Identify, Protect, Detect, Respond, and […]

Good Governance Includes the Outliers

In his book, “Outliers: The Story of Success,” Malcom Gladwell says that outliers are often extraordinary individuals. Think Benjamin Franklin, Mozart, Bill Gates and even sports phenoms like tennis star Novak Djokovic. These success stories are often the result of “accumulated advantages.” For example, great athletes don’t start out as […]

Six Times Over, SailPoint Leads

Leading with integrity is not something we take lightly at SailPoint. It colors every facet of our business. From the care we take in addressing our customers’ identity needs, to the investment we make in continually innovating well ahead of the market, to the approach we take in constantly refining […]

Identity & Access Management: The Cornerstone of Enterprise Security

Privileged Access Management (PAM) is a sub-discipline within the identity governance framework. PAM can be implemented and operate on its own or be integrated into an organization’s Identity & Access Management (IAM) policy and processes. Organizations may choose to start with either an IAM or PAM implementation in order to […]

Enterprise security – brought to you by the letters A and I

If you’re a byproduct of the 70s and 80s, you may recall the days of TV shows that were designed to educate as well as entertain. Sesame Street has been one of these long-standing shows. And while we were taught basic life lessons such as being kind to one another, counting, and even understanding emotions, […]

Your Data Sucks… We Can Help

I’m sorry to have to be the one to tell you this, but your data sucks… and that’s a big problem. Artificial intelligence and machine learning will transform identity governance over the next few years and you need to get ready so you can take advantage of it. Here is […]

The Power of AI + ML + Identity

It’s only been a couple of months since we unveiled SailPoint Predictive Identity and the conversations I’ve had with customers and prospects since then have only further solidified what we suspected: the future is here. Organizations are showing signs of being more than ready to tackle their identity programs from […]

Embrasser le passé et le futur

Si vous avez eu la chance de vivre dans les années 70 et 80, vous vous souvenez peut-être de l’époque où les dessins animés, comme Looney Tunes™, n’étaient diffusés que le samedi matin (du moins aux États-Unis, c’était comme ça). Les chaînes de télévision fermaient à minuit pendant qu’elles jouaient […]