The Point - The SailPoint Blog

The Economic Reality: Prudent IT Purchases Focus on Value

Like Kevin, I’ve been spending a lot of time on the road meeting with SailPoint customers and prospects. During these meetings, I have the pleasure of hearing firsthand perspectives on how companies are addressing immediate identity and security needs, while trying to survive a very difficult economy. Managing the IT […]

All’s Fair in Security?

I read an interesting piece in InfoWorld by Roger Grimes, « A Sweet Solution to the Insider Threat. » The premise of Grimes’ article is that companies should use computer decoys, or « honeypots, » to catch workers attempting to login to resources they have no business reason for accessing. Honeypots by their very […]

The World is Flat When Integrating Governance and Compliance

In his recent Network World column, « The Regional, Cultural and National Differences of Identity Management, » Dave Kearns discussed a panel he moderated at last week’s European Identity Conference: On a panel called « Is there a difference between the European way of doing IAM/GRC and the rest of the world? » I […]

Getting Real about Transparency: What You Can’t See May Bite You

In SailPoint’s second Market Pulse Survey (announced yesterday), we asked Global 2000 companies about how they are managing IT risk given the economic downturn and resulting corporate churn. Not surprisingly, given the recessionary budgets and resource allocations these companies are facing, the survey showed that companies remain very exposed to […]

Steak Dinner for Your Data?

I’ve been at the RSA Conference all week, so I just noticed an intriguing news item from The Register on Monday. The article details survey results from an unnamed security vendor, concluding that one-third of workers are open to bribes for data theft. It’s beyond the scope of this blog […]

Watching the Identity Management Sun Set

Most of us were surprised yesterday to hear Oracle’s intentions to acquire Sun. What does this announcement mean for the IdM space? While Oracle has taken out one of its chief competitors in the IdM suite business as a by-product of the acquisition, it has done so at the cost […]

Virtualizing an Identity Appliance

These days I spend a lot of time on the road talking to customers, prospects, and business partners. I’m fortunate to spend time with some of the smartest people in the industry and hear about the kinds of projects that are still being funded in troubled times. Of all of […]

Verizon Business Report: Data Breaches Can Be Avoided

Verizon Business just posted the results of their 2009 Verizon Business Data Breach Investigations study this morning. This is Verizon Business’ second annual study, and it highlights some interesting – and unfortunately not surprising – statistics. Of the 285 million compromised records that Verizon studied, 93 percent occurred in the […]

Feet on the Street: Thoughts from Gartner’s IAM Summit in London

This week I’m over in London meeting with customers and partners at the Gartner IAM Summit. Gartner analyst Earl Perkins kicked off a packed conference this morning with his keynote address, « Enabling Governance and Risk Management in an Age of Business Challenges. » A couple of points made by Earl rang […]

SailPoint Simplifies the Process of Buying and Deploying Identity Management

Last week, Burton Group analyst Lori Rowland wrote about how the weakened economy has been good for identity management technologies. I agree with Lori – the churn created by the recession has heightened the need for companies to proactively manage risk associated with user access controls. Compliance and identity governance […]