What is Role-Based Access Control (RBAC)?
Role Based Access Control (RBAC) increases your ability to manage access, boosts security, improves compliance and adds efficiencies to your IT operations.
What is CIEM?
As organizations move to single and multi-cloud environments, securing access to cloud platforms is becoming complex. See why CIEM is key.
The Power to Prevent: How Access Risk Management Detects Threats Before ...
Authored by: Jody Paterson Now available within IdentityNow, SailPoint’s Access Risk Management enables organizations to get granular visibility into potential access risks within complex ERP systems such as SAP — even before access is approved and provisioned. One of the biggest challenges facing any enterprise is risk management, particularly managing risks [...]
SailPoint’s Product Management Webinar – Access Modeling
View SailPoint's Senior Product Manager Erik Huckle's webinar on Access Modeling and how it has scaled with the rate of change organizations are experiencing.
SailPoint’s New Password Management User Experience Webinar
Learn about SailPoint's new Password Management enhancements, the depreciation timeline for the existing experience and the opt-in process for the new features.
Global Chemical Company, Ingevity, Achieves Compliance by Automating Eme...
SailPoint’s Identity Platform allowed the security and risk owners at Ingevity to grant temporary elevated access to users in a compliant manner, without exposing the company to unnecessary risks.
How Element Solutions Automated and Streamlined Access Reviews
SailPoint’s Identity Platform automates the review process from end to end, accelerating the time it takes to manage, track and close reviews.
Five Tenets of Holistic Access Governance for SAP
An understanding of access and the risk it poses to business systems such as SAP are vital for security and protection against fraud and data theft. Learn more.
The Art of War on Enterprise Access Risks
If Sun Tzu were writing The Art of War today, unequivocally, he would add a few chapters and tactics to address today’s electronic warfare that extends beyond the battlefield. When penning his treatise on war approximately 2,400 years ago, Tzu wasn’t envisioning modern organizations around the world having to arm themselves to defend against cyber threats of every type—including attacks from outside hackers and even [...]
On-Premise vs Cloud Password Management
With a next-gen password management solution, organizations can meet their security needs by protecting passwords across on-premises and cloud-based applications.
Federated Identity Management vs. SSO
When you need to authenticate many users across multiple enterprises for security purposes, is Federal Identity Management (FIM) or SSO the right choice?
What is User Provisioning and Singe Sign On?
Automated methods for SSO and user provisioning further simplify authentication, while providing employees secure, seamless access across multiple applications.