Access Management Article Single tenant vs multi-tenant SaaS: What’s the difference? See how organizations weigh single tenant vs multi-tenant with definitions and explanations of the benefits, challenges and differences. White Paper Security for non-employee identities - White Paper Market View Multi-tenant SaaS vs. single-tenant SaaS: It matters Webinar Evaluating non-employee identity management - Webinar Market View Password Management – The road to IT productivity Article What is access management? - Article See how access management can help organizations protect critical systems and valuable data as well as ensure compliance with evolving requirements. Market View It’s a good thing I’m not bitter: how easy it’d be to ... Authored by Anonymous SailPoint Employee Before joining SailPoint, I worked at a B2B company for just over a decade. I loved my time there, and I still have nothing but the fondest of feelings for the organization, the people I worked with, and the work we did together there. And, [...] Market View Why identity security is core to your business Without identity security, there is no enterprise security. The companies who rally behind this statement are the ones who stay out of the headlines. They remain protected. They drive down risk. They drive up business agility. This creates acceleration and energy across their business. And ultimately, this empowers the entire [...] Market View My top takeaways from Gartner IAM 2023 Authored by Jaishree Subramania, Vice President of Product Marketing SailPoint was the premium partner for this year’s Gartner Identity & Access Management (IAM) Summit, which works to unite IAM and security leaders to foster identity-first security initiatives, modernize business models, and advise on a strong security posture in today’s identity [...] Article Vendor risk management: Definition and guide See how a vendor risk management program helps thwart threats by closing external loopholes that could provide unauthorized access opportunities. Market View Top 10 signs your approach to non-employee identity management needs imp... Authored by Mike Conti, Product Marketing Manager To increase flexibility and boost competitiveness, organizations have eagerly embraced a growing diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level [...] Video Automate temporary elevated access requests - Video Granting elevated access is a process fraught with the potential for risk and compliance issues. See how to automate temporary elevated access requests. Market View Enterprise security through the right lens Have you ever stopped to look at something and thought, “Hm, that doesn’t look right”? Maybe it’s the painting hanging on the wall in your living room and you notice it’s slightly off-center one day as you’re packing up to leave for work. Or maybe it’s the project at work [...] Happening Navigate 2022: CISO-to-CISO Panel (Day 2) Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. [...] 123Next ›»