Identity Security and Cloud Access Management
Learn how SailPoint enables comprehensive cloud access visibility and governance across Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
7 Best Practices for Identity Access Management
Today’s business world is fast moving, entails more applications, involves more categorizations of users, and is exponentially more complex for IT to enable than ever before. What once used to be straightforward has become a giant, inter-connected ecosystem teeming with thousands of applications, people and devices. This has created a [...]
Access Modeling and Greek Mythology
SailPoint has been building new capabilities that simplify the process of uncovering, creating and updating/maintaining roles. Learn more about access modeling.
8 Types of Password Attacks
Stolen, weak and reused passwords are the leading cause of hacking related data breaches. Learn about common password attacks and how to mitigate your risk.
Get the Most Out of Access Request
With the new capabilities added to Access Request, organizations can ensure that only necessary access is seen and requested by the right individuals. Learn more.
Forrester Report: The Future of Identity and Access Management
Read Forrester's report on why Identity and Access Management (IAM) is an essential security component that's critical for customer security and privacy.
Introduction to Passwordless Authentication
Passwordless authentication verifies identity without requiring a memorized secret—like a password or pin. Organizations use passwordless solutions to reduce risks.
What is Multi-Factor Authentication?
Multi-factor authentication (MFA) is an additional security layer to your user authentication and helps secure access in the event of compromised user credentials.
Safeguard Utilities with Identity Security
Automating identity processes gives utilities the power to increase visibility, generate efficiencies, and improve compliance and security. Learn more.
What is SCIM Provisioning?
SCIM provisioning allows companies to manage user identities in the cloud efficiently and easily add or remove users within their enterprise. Learn how it works.
Overview of Identity Provisioning
Identity provisioning manages user accounts to ensure they're getting access to the right resources and using them appropriately. Learn more.
Identity and Access Management Security Checklist
Check out our Identity and Access Management (IAM) security checklist to create efficient workflows, equip team members, and keep your critical assets secure.
Identity Security Mitigates Access Management Risk
Businesses can’t safely use technology without identity security. Here's why you need identity security at the foundation of your cloud business.