The Power to Prevent: How Access Risk Management Detects Threats Before ...
Authored by: Jody Paterson Now available within IdentityNow, SailPoint’s Access Risk Management enables organizations to get granular visibility into potential access risks within complex ERP systems such as SAP — even before access is approved and provisioned. One of the biggest challenges facing any enterprise is risk management, particularly managing risks [...]
Global Chemical Company, Ingevity, Achieves Compliance by Automating Eme...
SailPoint’s Identity Platform allowed the security and risk owners at Ingevity to grant temporary elevated access to users in a compliant manner, without exposing the company to unnecessary risks.
How Element Solutions Automated and Streamlined Access Reviews
SailPoint’s Identity Platform automates the review process from end to end, accelerating the time it takes to manage, track and close reviews.
Five Tenets of Holistic Access Governance for SAP
An understanding of access and the risk it poses to business systems such as SAP are vital for security and protection against fraud and data theft. Learn more.
On-Premise vs Cloud Password Management
With a next-gen password management solution, organizations can meet their security needs by protecting passwords across on-premises and cloud-based applications.
Federated Identity Management vs. SSO
When you need to authenticate many users across multiple enterprises for security purposes, is Federal Identity Management (FIM) or SSO the right choice?
The Art of War on Enterprise Access Risks
If Sun Tzu were writing The Art of War today, unequivocally, he would add a few chapters and tactics to address today’s electronic warfare that extends beyond the battlefield. When penning his treatise on war approximately 2,400 years ago, Tzu wasn’t envisioning modern organizations around the world having to arm themselves to defend against cyber threats of every type—including attacks from outside hackers and even [...]
What is User Provisioning and Singe Sign On?
Automated methods for SSO and user provisioning further simplify authentication, while providing employees secure, seamless access across multiple applications.
SAML SSO vs. LDAP
Many service providers and identity providers support protocols such as SAML and LDAP. Which one is best for your use case? Let’s take a look at SAML SSO vs. LDAP.
SAML vs. OIDC: Authentication Protocols Explained
Authentication protocols help verify user identities. Learn about the difference between SAML and OIDC and how each can benefit your business.
What is Knowledge Based Authentication?
Knowledge Based Authentication can help you lessen fraudulent attempts to gain or use sensitive data, but KBA is only a partial piece of your security puzzle.
File Access Management for Healthcare Data Breaches
SailPoint’s File Access Management helps healthcare organizations securely control access to sensitive data and files in the cloud and on-premises. Learn more.
Unstructured Data | Global Survey Report
This paper reviews our global research survey conducted to understand current trends around the management and governance of unstructured data. Read more.