SAML vs. OIDC: Authentication Protocols Explained
Authentication protocols help verify user identities. Learn about the difference between SAML and OIDC and how each can benefit your business.
What is Knowledge Based Authentication?
Knowledge Based Authentication can help you lessen fraudulent attempts to gain or use sensitive data, but KBA is only a partial piece of your security puzzle.
File Access Management for Healthcare Data Breaches
SailPoint’s File Access Management helps healthcare organizations securely control access to sensitive data and files in the cloud and on-premises. Learn more.
Unstructured Data | Global Survey Report
This paper reviews our global research survey conducted to understand current trends around the management and governance of unstructured data. Read more.
Identity Security and Cloud Access Management
Learn how SailPoint enables comprehensive cloud access visibility and governance across Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Access Modeling and Greek Mythology
SailPoint has been building new capabilities that simplify the process of uncovering, creating and updating/maintaining roles. Learn more about access modeling.
Challenges of Cloud Access Management
Learn about the challenges of managing cloud access and how to find unused and inappropriate IaaS access with SailPoint Cloud Access Management. Watch our demo.
Get the Most Out of Access Request
With the new capabilities added to Access Request, organizations can ensure that only necessary access is seen and requested by the right individuals. Learn more.
7 Best Practices for Identity Security
Today’s business world is fast moving, entails more applications, involves more categorizations of users, and is exponentially more complex for IT to enable and secure than ever before. What once used to be straightforward has become a giant, inter-connected ecosystem teeming with thousands of applications, people, and devices. This has [...]
Safeguard Utilities with Identity Security
Automating identity processes gives utilities the power to increase visibility, generate efficiencies, and improve compliance and security. Learn more.
8 Types of Password Attacks
Stolen, weak and reused passwords are the leading cause of hacking related data breaches. Learn about common password attacks and how to mitigate your risk.
Identity Security Mitigates Access Management Risk
Businesses can’t safely use technology without identity security. Here's why you need identity security at the foundation of your cloud business.
Forrester Report: The Future of Identity and Access Management
Read Forrester's report on why Identity and Access Management (IAM) is an essential security component that's critical for customer security and privacy.