What Identity Governance is (Not)
I often catch articles in my newsfeed that are supposedly about identity governance, but upon reading the fine print, they invariably wind up being about access management. These articles are all missing the bigger picture – access management is essentially the ‘badge reader’ of identity, the granting of access to [...]
Trust the Identity, but Verify the Access
The events of the last few weeks have had me reflecting on my epidemiology courses. As I shuffled through old lecture notes, an item stood out: opportunistic infections (OIs) and mortality. In essence, people with compromised immune systems are more likely to become ill, and seriously ill, compared to individuals [...]
Identity Governance for Healthcare Organizations
Read about the unique challenges of identity governance in healthcare, as well as capabilities that organizations should look for in a platform and provider.
I Get by with a Little (Access Modeling) Help from my Friends
I have the unique opportunity to talk to organizations across the world about their identity challenges. Throughout these conversations I am struck by the scale and complexity of new users joining the organization, moving between departments or leaving the organization as part of the normal course of business. When you [...]
IdentityNow Helps Online Retailer Revitalize Its Identity Management Pro...
Founded just after the pop of the dot-com bubble, this U.S.-based home goods retailer sells more than 14 million household items from thousands of providers.
Identity & Access Management: The Cornerstone of Enterprise Security
Privileged Access Management (PAM) is a sub-discipline within the identity governance framework. PAM can be implemented and operate on its own or be integrated into an organization’s Identity & Access Management (IAM) policy and processes. Organizations may choose to start with either an IAM or PAM implementation in order to [...]
Identity Centric Zero Trust for SailPoint and Ping
If your like most organizations, you’re moving more and more applications to the cloud. But you still need to maintain critical applications on-premises. Learn how.
IAM - Identity and Access Management
Identity and access management (IAM) ensures only the right people can access the appropriate data and resources at the right times.
Password management solutions provide an easy, intuitive way to change or reset passwords, while enforcing a strong password policy across all applications.
SailPoint – Okta Integration Demonstration Video
See how SailPoint seamlessly integrates with Okta to give you the power to see and control access for everyone to everything across your organization.
CDM Phase II with Identity Governance and Provisioning
SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring as a Service (CMaaS) program Blanket Purchase Agreement (BPA) holders.
Risk Posture and Identity and Access Data
Protecting information assets and your business as a whole requires a way to identify and assess risks and take the necessary steps to reduce them. Learn more.
Securing Access to Files with Identity Governance
Identity and access management leaders face growing security risk represented by sensitive data stored in unsecured files. Secure access with identity governance.