Security Article Separation of duties (SoD) - Article See how separation of duties (SoD) can help prevent security compromises, such as errors, fraud, misuse of information, sabotage, and theft. Article How Compromised Credentials Lead to Data Breaches Understanding what causes stolen or compromised user credentials can play a key role in preventing future security attacks like data breaches. Learn more. Article Password management best practices - Article See why password management is one of the easiest security solutions to implement and how it nearly eliminates a highly-exploited attack vector. Article Authentication methods used for network security Learn about the many authentication methods, ranging from passwords to fingerprints, to confirm the identity of a user before allowing access. Special Report State of IaaS Cloud Infrastructure Report To understand current cloud infrastructure (IaaS) utilization and management practices, we surveyed executives and governance professionals. Download the report. Solution Brief Azure Active Directory with AI-driven Identity To meet security and compliance needs of organizations, Microsoft Azure and SailPoint bring together identity management and protection with AI-driven governance. Video Identity Management for Modern Healthcare Systems Modern healthcare systems need to manage identity access in a seamless and scalable manner in order to improve caring coordination and operational efficiency. Webinar Secure Expanding Remote Workforce with Zero Trust The process of digital transformation can provide many innovative benefits – but could introduce risk if not implemented properly. This is why leading enterprises are taking an identity focused zero trust approach. Video SailPoint & Proofpoint Integration Demo See SailPoint & Proofpoint’s people centric security in action. Webinar Security and Access in Higher Education Webinar This webinar explores how to make accessing applications and data easier in higher education, while reducing security risk and ensuring regulatory compliance. Video SailPoint and Ping Solutions SailPoint and Ping's integration provides a foundation for secure, seamless access that can be closely governed, ensuring the right level of access. Webinar Identity & Access Governance and Data Breach Risks A big challenge for a majority of security pros is the lack of oversight regarding who has access, should they have access, and what are they doing with it. Solution Brief Mitigate Risk and Improve Your Security Posture With SailPoint and Proofpoint, you can take a people-centric approach to managing email threats, improving governance and securing your organization. Video Why Identity is the Secret to Stopping Data Breaches Our EVP of Products Grady Summers has some interesting insights on the connection between data breaches and identity. He shares those insights and how to use them to make your organization more secure in this Identity Talks episode. «‹ Previous7891011Next ›»