What is Multi-Factor Authentication?
Multi-factor authentication (MFA) is an additional security layer to your user authentication and helps secure access in the event of compromised user credentials.
What is SCIM Provisioning?
SCIM provisioning allows companies to manage user identities in the cloud efficiently and easily add or remove users within their enterprise. Learn how it works.
State Governments Rely on SailPoint to Address Top Priorities
NASCIO recently released their top priorities for 2021. The NASCIO list is formed by a survey of its membership, whom it asks to prioritize the top issues they face. This year’s results we noticed a few shifts in the top priorities but many that stayed the same from the previous [...]
Overview of Identity Provisioning
Identity provisioning manages user accounts to ensure they're getting access to the right resources and using them appropriately. Learn more.
Identity and Access Management Security Checklist
Check out our Identity and Access Management (IAM) security checklist to create efficient workflows, equip team members, and keep your critical assets secure.
Identity Management Protocols
Identity management protocols vary based on what type of assets need to be authenticated. Here are eight of the most-common protocols used in IAM.
History of Identity Management
Identity management continues to evolve with our digital ecosystem. But to understand future trends, we must revisit the history of identity management.
What is Federated Identity?
Federated Identity gives users access to service provider’s applications by confirming their credentials and permissions through the identity provider. Learn more.
Privileged User Activity Auditing Best Practices
Read our five best practices for ensuring your organization is prepared to take on the privileged user activity auditing process and handle issues as they arise.
Privileged Access Management Best Practices
Managing privileged access reduces your risks of a cyberattack. But to do so effectively, you need to follow privileged access management best practices.
Privileged Access Management Use Cases
Privileged access management provides enhanced security and compliance. Here are some common privileged access management use cases and why they’re important.
What is Attribute Based Access Control?
Attribute-based access control (ABAC) is an authentication and authorization model that uses attributes, rather than roles, to grant user access. Learn more.
Privileged Access Management Security Risks
Check out our compilation of common privileged access risks that affect account and enterprise integrity to help you plan for and safeguard against them.
5 Key Findings on the Importance of Integrating Identity Governance and ...
This blog is co-authored by PwC, CyberArk and SailPoint. Today’s security and compliance environment is rapidly transforming, presenting new and even more advanced challenges that no single solution or vendor alone can fully address. That’s why we like to think of security as a “team sport”. Security needs to [...]