The Identity Blog

The SailPoint Blog
Connectivity: The secret weapon to identity security success

Understanding and satisfying identity security requirements is about helping organizations not only secure access to environments, but also realize business value as quickly as possible. And the first step is to secure access to applications. When organizations don’t apply core identity security principles – such as access requests, access approvals, certifications, and in...

Congratulations! AES wins CSO Award for transformative identity security with SailPoint

Fortune 500 global energy company The AES Corporation (NYSE: AES) has been named a CSO Award winner for 2024! This prestigious award recognizes the work its team has done in identity security – rapidly scaling and transforming its end-to-end digital lifecycle management processes through an integrated approach with SailPoint. Congratulations to Ryan Boulais, Chief Informati...

SailPoint application onboarding: AI-powered lifecycle management for enterprise applications

SailPoint application onboarding: AI-powered lifecycle management for enterprise applications The first step to identity security success is securing access to the applications enterprises use every day. The sooner enterprises can identify ungoverned applications and implement right time-right access controls for each identity, the sooner they can realize value from importa...

FedRAMP explained: Why it matters

Author: Ryan Cooney, Manager, Compliance Federal Program Management Government agencies, critical infrastructure, and government contractors seeking a SaaS-based identity security solution must choose a FedRAMP-authorized cloud service provider (CSP) they can trust to advance their identity security program. We sat down with Ryan Cooney, Manager of Federal Security Complia...

The identity security journey: Meeting customers where they are

Today, identity security is an indispensable pillar of a business’s digital defenses. As cyber threats grow in scale and sophistication, next-gen identity security that equips enterprises to effortlessly manage and secure access to applications and data – at speed and scale – is critical. However, beyond the overall goal of securing access to applications and data, enterpr...

Reduce risk and improve security with Activity Insights

In a perfect world, we would have everything we need to make speedy, accurate identity access decisions. In reality, to make these good decisions, we must analyze a lot of data, including context, information, history, analysis and the balance of short- and long-term value. Who has time for all that? Now you do, with SailPoint Activity Insights as part of SailPoint Identity...

The enterprise security tipping point

Enterprise cybersecurity continues to become increasingly more complex and stressful for CISOs and CIOs to successfully navigate. Take the recent SEC lawsuit against SolarWinds. For the first time, the SEC has brought charges against an individual—specifically a CISO—in connection with an enterprise cybersecurity incident. The ramifications based on this milestone moment ar...

SailPoint’s new Customer Success Center: A look inside

Author: Christopher Caruso, VP, Customer Success We are thrilled to announce the initial launch of SailPoint’s Customer Success Center (CSC), marking a new chapter in our commitment to enhancing the digital customer experience. This launch represents the first phase of an ongoing journey to develop a comprehensive customer experience platform that adapts and grows based on...

5 things you don’t want to miss at RSAC 2024

We are excited to share that SailPoint will be a bronze sponsor at this year’s RSA Conference, scheduled to take place from May 6-9 at the Moscone Center in San Francisco, CA. In this blog post, we aim to provide you with a comprehensive list of where you can find and engage with SailPoint at the event. When and where is the event? May 6-9 at Moscone Center, San Francisco ...

5 tips for strengthening your identity security program with integrated data access governance

Authored by: Eric Zimmerman, SailPoint, Product Marketing Manager As your identity security program evolves, it’s essential to gain greater context on critical content to help lock down sensitive information as a foundational piece of your security program. At the end of the day, data is ultimately what you are trying to govern and protect. With the proliferation of sensi...