Software-as-a-service (SaaS) solutions can be a huge improvement over traditional IT solutions in many ways, from cost and scalability to easier deployment and maintenance. Those benefits (and others) are helping to drive rapid growth in the SaaS market, which is projected by Gartner to top 16% in 2023. But with that growth of SaaS services in the enterprise also comes som...
The Identity Blog
Authored by Jerry Aubel, Senior Product Marketing Manager Think fast: what’s the most critical element of a robust Identity and Access Management strategy? Ask any security team, and I’ll wager that their answers will be all over the map. One key element that’s sometimes overlooked is password management. But take a closer look, and you’ll likely agree it’s a critical cap...
Managing cyber security for an organization is an ongoing process that evolves as an organization’s infrastructure, applications, technology, and user base evolves. For many organizations, cloud is an important part of that evolution. Some organizations have gone fully to the cloud with applications and data; others are still wholly on-premises, while many others are somew...
Authored by Anonymous SailPoint Employee Before joining SailPoint, I worked at a B2B company for just over a decade. I loved my time there, and I still have nothing but the fondest of feelings for the organization, the people I worked with, and the work we did together there. And, let me tell you, it’s a good thing that I don’t have an iota of bitterness or negative feeli...
The 2023 RSA Conference in San Francisco showcased cutting-edge developments in the cybersecurity landscape, focusing on the potential and challenges Large Language Models (LLMs), the increasing importance of identity as the new perimeter for cyber defense, and the cybersecurity imperative for national defense. In this blog, I’ll be diving into the three key themes that eme...
Most companies do not doubt that implementing identity and access governance in their organization might be a good idea. But what’s the best way to do it? By following the advice of those who have gone before. Specifically, at Navigate 2022 in London, IT leaders from various industries recently shared their best practices for initiating an identity and access governance pr...
Without identity security, there is no enterprise security. The companies who rally behind this statement are the ones who stay out of the headlines. They remain protected. They drive down risk. They drive up business agility. This creates acceleration and energy across their business. And ultimately, this empowers the entire workforce to rally behind the business, driving...
One thing we are proud of at SailPoint is our global footprint. From Europe, to America, to APAC, our capabilities, our customer base, and our talent. Today, we wanted to take a moment to highlight our crew in Latin America. Kate Cox, senior manager of engineering, sat down with Mark McClain, CEO, and Raul Carbajal, director of engineering, to talk about SailPoint and its ...
Regardless of what industry you’re in, identity security must be a component of your overall cyber security strategy. Identity security is a critical line of defense against cyber threats, enabling the management and governance of access for every digital identity in an organization. Digital identities, such as email addresses or login credentials and pin numbers, are uniq...
Enterprises have a lot invested in their legacy identity security solutions, so it comes as no surprise when they may resist the idea of migrating to a modern solution. It can be difficult to convince stakeholders across the organization to turn their backs on the time and money already spent in maintaining the complex web of integrations that comprise the enterprise’s iden...