Single tenant vs multi-tenant SaaS: What’s the difference?
See how organizations weigh single tenant vs multi-tenant with definitions and explanations of the benefits, challenges and differences.
What is access management? - Article
See how access management can help organizations protect critical systems and valuable data as well as ensure compliance with evolving requirements.
It’s a good thing I’m not bitter: how easy it’d be to ...
Authored by Anonymous SailPoint Employee Before joining SailPoint, I worked at a B2B company for just over a decade. I loved my time there, and I still have nothing but the fondest of feelings for the organization, the people I worked with, and the work we did together there. And, [...]
Why identity security is core to your business
Without identity security, there is no enterprise security. The companies who rally behind this statement are the ones who stay out of the headlines. They remain protected. They drive down risk. They drive up business agility. This creates acceleration and energy across their business. And ultimately, this empowers the entire [...]
My top takeaways from Gartner IAM 2023
Authored by Jaishree Subramania, Vice President of Product Marketing SailPoint was the premium partner for this year’s Gartner Identity & Access Management (IAM) Summit, which works to unite IAM and security leaders to foster identity-first security initiatives, modernize business models, and advise on a strong security posture in today’s identity [...]
Vendor risk management: Definition and guide
See how a vendor risk management program helps thwart threats by closing external loopholes that could provide unauthorized access opportunities.
Top 10 signs your approach to non-employee identity management needs imp...
Authored by Mike Conti, Product Marketing Manager To increase flexibility and boost competitiveness, organizations have eagerly embraced a growing diverse population of consultants, partners, vendors, and other contingent labor, as well as non-human technologies like service accounts, bots, and smart devices. But it’s often difficult to gauge the maturity level [...]
Automate temporary elevated access requests - Video
Granting elevated access is a process fraught with the potential for risk and compliance issues. See how to automate temporary elevated access requests.
Enterprise security through the right lens
Have you ever stopped to look at something and thought, “Hm, that doesn’t look right”? Maybe it’s the painting hanging on the wall in your living room and you notice it’s slightly off-center one day as you’re packing up to leave for work. Or maybe it’s the project at work [...]
Navigate 2022: CISO-to-CISO Panel (Day 2)
Authored by Brian Royer, Content Marketing Writer The Navigate 2022 Customer Panel: CISO to CISO proved one of our most popular sessions. It featured an expert group of CISOs who brought their unique perspectives on the best practices and successful outcomes they’ve experienced when taking an “uncompromising” approach to identity security, including Zero Trust. [...]