Skip to Main Content

The Identity Blog

Why prioritize identity security in the modern enterprise?

Identity security is at the core of modern security today. With threats to applications and sensitive data greater than ever, how can enterprise security leaders establish a stronger, more resilient enterprise security program and keep their companies safe? SailPoint’s live virtual event, IdentityTV, featured expert insights on what’s driving the […]

What’s new at SailPoint? Glad you asked… 

The SailPoint crew has had a busy summer!   We kicked off the season with several product updates. We announced new Data Access Security and Non-Employee Risk Management capabilities within the SailPoint Identity Security Cloud, offering our customers better visibility, efficiency, and security. Additionally, we launched our new AI-powered application onboarding […]

ASDA reveals how SailPoint supported the supermarket to build a new, nationwide identity security program

On 4 March 2024 at Gartner’s UK Identity & Access Management Summit, Simon Langley, ASDA’s Chief Information Security Officer (CISO) joined Steve Bradford, SailPoint Senior Vice President (SVP) on stage for a discussion around how to successfully implement a strong identity security program. In an engaging Q&A, Simon shares how […]

Gain real-time visibility of appropriate access to data

Author: Eric Zimmerman, Product Marketing Manager In today’s data-driven landscape, modern enterprises depend on their business data to boost productivity and drive innovation. From AI initiatives to business intelligence, having the right access to the right information is crucial for data-backed decision-making. But what happens when organizations lack full visibility […]

Connectivity: The secret weapon to identity security success

Understanding and satisfying identity security requirements is about helping organizations not only secure access to environments, but also realize business value as quickly as possible. And the first step is to secure access to applications. When organizations don’t apply core identity security principles – such as access requests, access approvals, […]

Celebrating Pride Month at SailPoint

Happy Pride Month! At SailPoint, we’re proud to celebrate and honor our incredible crew in the LGBTQIA+ community. Their voices and contributions help make our workplace more vibrant and inclusive. Read on to hear from three crew members as we celebrate Pride this month, and all throughout the year! Xavier […]

Congratulations! AES wins CSO Award for transformative identity security with SailPoint

Fortune 500 global energy company The AES Corporation (NYSE: AES) has been named a CSO Award winner for 2024! This prestigious award recognizes the work its team has done in identity security – rapidly scaling and transforming its end-to-end digital lifecycle management processes through an integrated approach with SailPoint. Congratulations […]

SailPoint application onboarding: AI-powered lifecycle management for enterprise applications 

SailPoint application onboarding: AI-powered lifecycle management for enterprise applicationsThe first step to identity security success is securing access to the applications enterprises use every day. The sooner enterprises can identify ungoverned applications and implement right time-right access controls for each identity, the sooner they can realize value from important identity […]

FedRAMP explained: Why it matters 

Author: Ryan Cooney, Manager, Compliance Federal Program Management   Government agencies, critical infrastructure, and government contractors seeking a SaaS-based identity security solution must choose a FedRAMP-authorized cloud service provider (CSP) they can trust to advance their identity security program. We sat down with Ryan Cooney, Manager of Federal Security Compliance, to […]

The identity security journey: Meeting customers where they are

Today, identity security is an indispensable pillar of a business’s digital defenses. As cyber threats grow in scale and sophistication, next-gen identity security that equips enterprises to effortlessly manage and secure access to applications and data – at speed and scale – is critical. However, beyond the overall goal of […]