Protecting Unstructured Data with SailPoint
Find out how you can protect applications and unstructured data together with SailPoint's unified identity governance approach.
What Identity Governance is (Not)
I often catch articles in my newsfeed that are supposedly about identity governance, but upon reading the fine print, they invariably wind up being about access management. These articles are all missing the bigger picture – access management is essentially the ‘badge reader’ of identity, the granting of access to [...]
Governing Access and Digital Transformation Webinar
Check out SailPoint's webinar with Frost & Sullivan on governing access in the era of digital transformation and the key challenges IT teams face today.
End-to-End Identity Management: Okta Integration
The SailPoint & Okta integration leverages access management and identity governance to seamlessly authenticate while governing access across any platform.
Integrated Identity Governance Monitoring and Auditing
The integration of SailPoint and Splunk provides a best in class integrated identity governance, monitoring, and auditing solution.
Access Insights – Access History
See how SailPoint's Access Insights gives you the ability to see and report on past access changes in your business.
Trust the Identity, but Verify the Access
The events of the last few weeks have had me reflecting on my epidemiology courses. As I shuffled through old lecture notes, an item stood out: opportunistic infections (OIs) and mortality. In essence, people with compromised immune systems are more likely to become ill, and seriously ill, compared to individuals [...]
Identity Governance for Healthcare Organizations
Read about the unique challenges of identity governance in healthcare, as well as capabilities that organizations should look for in a platform and provider.
I Get by with a Little (Access Modeling) Help from my Friends
I have the unique opportunity to talk to organizations across the world about their identity challenges. Throughout these conversations I am struck by the scale and complexity of new users joining the organization, moving between departments or leaving the organization as part of the normal course of business. When you [...]
IdentityNow Helps Online Retailer Revitalize Its Identity Management Pro...
Founded just after the pop of the dot-com bubble, this U.S.-based home goods retailer sells more than 14 million household items from thousands of providers.
Identity & Access Management: The Cornerstone of Enterprise Security
Privileged Access Management (PAM) is a sub-discipline within the identity governance framework. PAM can be implemented and operate on its own or be integrated into an organization’s Identity & Access Management (IAM) policy and processes. Organizations may choose to start with either an IAM or PAM implementation in order to [...]
Identity Centric Zero Trust for SailPoint and Ping
If your like most organizations, you’re moving more and more applications to the cloud. But you still need to maintain critical applications on-premises. Learn how.
IAM - Identity and Access Management
Identity and access management (IAM) ensures only the right people can access the appropriate data and resources at the right times. Learn more.