Authored by Bridget Haraslic, Product Marketing Manager Hospitals, outpatient care, clinics, and other healthcare facilities face increasingly granular cyber liability insurance coverage requirements. Unprecedented claim payouts from ransomware attacks have led to a hardened market, and cyber insurers want to reduce their risk. Healthcare organizations are tasked with dem...
The Identity Blog
Authored by Nataliia Gnatiienko, Customer Marketing Manager Flinders University is a leading international university in Australia with a record of excellence and innovation in teaching, research, and community engagement. The University was retiring its legacy identity warehouse as it was no longer supported and required substantial maintenance. Looking for a cloud-first ...
Authored by Meredith Blanchar, Chief Customer Officer, and Denise Denson-Hanson, AVP, Community and Education There’s never been a better time to be an identity security professional! We heard again from many of our customers and partners at Navigate 2022 about the importance of developing and expanding the identity security talent pool. That’s why at SailPoint, we are on ...
Authored by Nataliia Gnatiienko, Customer Marketing Manager Pick n Pay, a prominent African retailer, strives to address socio-economic challenges by supplying high-quality, affordable food for all customers while providing employment and economic opportunities across its value chain. The company used to run manual access requests in their legacy identity solution, which t...
Authored by Grady Summers, Executive VP, Products For far too long, I have seen organizations and their IT teams rely on annual or quarterly certification campaigns to verify their users have the proper access. While access certifications are necessary, the traditional approach of yearly or quarterly certification campaigns offers little value when spotting risky access pr...
Authored by Cameron Wilson, Product Marketing Manager Whenever you hear the term “In case of emergency, break glass,” it’s often a fire hose or a crisis communications professional that comes to mind. However, in the realm of IT, it means providing temporary, elevated access to employees for a certain period. But this is almost easier said than done. Why? Enterprise Resou...
Authored by Jerry Aubel, Senior Product Marketing Manager Automation is an important key to a more efficient Identity Security program. One where you can concentrate more on execution and less on building manual processes. That’s why we are excited to talk to you about SailPoint Identity Security Cloud SaaS Workflows. SaaS Workflows can automate and orchestrate less defina...
Nobel prize-winning author John Steinbeck once said, “…to find where you are going, you must know where you are.” Having a starting point in whatever journey you are undertaking is vital as the path forward starts from there. In the case of our world, identity security for large, complex enterprises – it’s not about a distinct start and end point. It’s not one-and-done. It...
By Jerry Aubel, Sr. Product Marketing Manager If timing is everything, now may be the right time to begin your Role-Based Access Control journey. In my previous blog, I discussed access certifications and compliance functionality available in IdentityNow. Today, we’ll discuss the fundamentals of role management to help you determine if now is the right time to implement an...
Authored by Matthew Radcliffe, Area Vice President of Sales, US and Canada Healthcare organizations are challenged with knowing how to reduce clinician friction while increasing healthcare organizations’ ability to meet a rapidly changing security landscape. Often losing great clinical staff because they don’t have the right access when they need it most to care for patien...