The Implications of Bring Your Own Identity
When I was seventeen, I played one of the greatest roles of my life: “Mark Jannell.” A younger student who we’ll call “Tim” (not his name, of course) had just started at my high school, and after knowing me for several weeks, asked my name. Amused that he had forgotten [...]
Don’t Let Sleeping Hackers Lie—Identity Security Is One Trick to C...
If anyone asks me about why I joined SailPoint almost a year ago, they’re going to get an earful about how all security starts with identity. I’ve seen it for years: a breach that never would have occurred if the identity was properly secured. An intrusion that never would have become [...]
Amazon Event Bridge Demo
By connecting SailPoint and Amazon, you get best in breed identity security combined with the ability to collect and access performance and operational data.
8 Types of Password Attacks
Stolen, weak and reused passwords are the leading cause of hacking related data breaches. Learn about common password attacks and how to mitigate your risk.
Identity Security for the Cloud Enterprise Video
In our digital world, you can't do business without technology and you can't use technology without Identity Security. Learn about SailPoint Identity Security.
State of Identity Security Report
Read how organizations are using identity management and governance to reduce identity related breaches in the IDSA State of Identity Security report.
Introduction to Passwordless Authentication
Passwordless authentication verifies identity without requiring a memorized secret—like a password or pin. Organizations use passwordless solutions to reduce risks.
What is Multi-Factor Authentication?
Multi-factor authentication (MFA) is an additional security layer to your user authentication and helps secure access in the event of compromised user credentials.
5 Best Practices for Onboarding and Offboarding
We outlined five best practices for company efficiency in both onboarding and offboarding processes for your IAM solutions. Learn more.
What is SCIM Provisioning?
SCIM provisioning allows companies to manage user identities in the cloud efficiently and easily add or remove users within their enterprise. Learn how it works.
Identity and Access Management Security Checklist
Check out our Identity and Access Management (IAM) security checklist to create efficient workflows, equip team members, and keep your critical assets secure.
Privileged User Activity Auditing Best Practices
Read our five best practices for ensuring your organization is prepared to take on the privileged user activity auditing process and handle issues as they arise.
Zero Trust Identity Management Integration
SailPoint's integration with Zscaler provides Zero Trust identity management and enables enterprises to holistically govern and mange user access. Learn more.