Identity Governance in the Time of Coronavirus: Part 2
Of the many lessons CIOs have learned from this global health crisis, is the need to be digitally transformed. It is more critical than ever for organizations to move forward with their digital transformation initiatives. As organizations deal with rapidly deploying business continuity plans, enabling remote workers, quickly provisioning users’ [...]
Identity Governance in the Time of Coronavirus: Part 1
In a recent article by Solutions Review, Prediction: The Coronavirus Alters Discourse on Identity Governance and Administration, it discussed how the era of social distancing may increase awareness and deployment of identity governance solutions. As you’ll see, many of the problems that organizations encounter with managing the identities of remote [...]
Q&A with CISO Jennifer West on Her Priorities and Building a Collab...
When it comes to transforming security teams and building collaborative security cultures, chief information security officer (CISO) Jennifer West has an impressive record. From her current position as CISO and privacy officer at Redlands, Calif. based geographic information systems software provider ESRI, and her crucial roles as CISO at ServiceMaster [...]
Identity as ‘business essential’
In my line of work, I talk to a lot of people at companies of different sizes and industries. The vast majority of those people are charging down their digital transformation path with varying degrees of success and maturity. Some started early and are years into the process with most, [...]
Integrated Identity Governance Monitoring and Auditing
The integration of SailPoint and Splunk provides a best in class integrated identity governance, monitoring, and auditing solution.
Australia’s Privacy Awareness Week: Privacy is a Two-Way Street
Privacy is an inherent part of being human. To protect our privacy, we build fences around our backyards, but we also have fences to respect our neighbor’s privacy. When thinking about data, we need to think about protecting personal information by building a ‘digital’ fence. This step is critical to [...]
Access Insights – Access History
See how SailPoint's Access Insights gives you the ability to see and report on past access changes in your business.
Addressing The Data Privacy Landscape with Identity Governance
As the number of users and individual points of access continues to grow, so too does the risk, especially when many enterprises maintain millions of files, folders and other data repositories that house sensitive company and personally identifiable information. Without the right identity governance approach to manage and monitor access to these applications and data throughout each user’s lifecycle with the organization, enterprises expose themselves to a wide range of threats.
Why Password Management is a Big Deal
SailPoint’s Rich Keith gives us the low down on my password management is a big deal for organizations today. Rich Keith: Password management, why is that a big deal? Well, it’s a big deal because with automated password management, you can empower your users with self-service password reset. Password management [...]
Best Practices for Infusing Identity Governance into your ServiceNow Imp...
I think that we can all agree that it is more important than ever for organizations to empower their users with the right access, when they need it, where they need it, and of course securely. Those however can be challenging and even conflicting statements. With the overwhelming amount of [...]
Cloud Governance Overview Video
Learn how SailPoint Cloud Governance helps you discover, protect and govern access to all apps, data and privileged accounts across your multi-cloud environment.
Compliance or Agility? Why Not Both?
The increasing number of disclosed security breaches has recently shifted the public’s attention away from compliance.
Why Cyber Criminals Are Going Back to School
Have you given a thought to your children’s data? If you had a ‘huh?’ moment, hear me out. With so much concern about protecting our identities and personal information, one of the biggest oversights I have found during my time working in the security industry is protecting our children’s school [...]
Using risk to align IAM with business objectives
Why alignment matters It is easy to see how an IAM initiative relates to your organization’s process, data and technology needs. However, the connection between your IAM program’s direction and your organization’s overarching business objectives can be more difficult to spot. Don’t let that fool you — aligning IAM and [...]