Quantcast
Channel: SailPoint
Browsing all 193 articles
Browse latest View live

Good Governance Includes the Outliers

In his book, “Outliers: The Story of Success,” Malcom Gladwell says that outliers are often extraordinary individuals. Think Benjamin Franklin, Mozart, Bill Gates and even sports phenoms like tennis...

View Article



What’s the Key Enabler for Security Incident Response?

A modern Security Incident Response solution is a system of interconnected components working together to identify known and unknown threats and to prevent or limit the damage done by those threats....

View Article

Driving Deeper into Cloud Identity Governance

SailPoint took a very important step today, announcing our intent to acquire two companies – Orkus and OverwatchID – both of which will help us to extend our ability to more deeply govern access...

View Article

Samsung BioLogics Builds Identity Governance from the Ground Up

Samsung BioLogics is headquartered in South Korea and manufactures biopharmaceutical products. Founded in 2011, the company entered the biopharmaceutical industry during a time in which the industry...

View Article

Observations from SecureWorld Detroit

Just a couple of weeks ago, security professionals, including myself, ascended upon SecureWorld Detroit to hear the latest from top security industry experts.  I also had the great opportunity to be...

View Article


Image may be NSFW.
Clik here to view.

2019 Market Pulse Survey: If Time is Money, Then Identity Pays

Consider this. You are an IT leader at an enterprise organization. You have not been living under a rock, and therefore are well aware that companies across the world struggle with cybersecurity....

View Article

Zero Trust in the Digital Transformation Age

In the digital transformation age, enterprises are shifting from traditional perimeter security approaches to the Zero Trust framework to protect their most sensitive networks. Centered on the belief...

View Article

Back to School: National Cybersecurity Awareness Month Edition

My first cybersecurity memory is working on my Commodore 64 computer with a military-grade type dial-up modem. This was before the Internet and I would use a BBS systems (bulletin board systems) where...

View Article


What Does Cloud-First and Identity Security Really Mean to Business?

As organizations adopt new technologies and evolve their business protocols through Digital Transformation, what’s the effect on identity and access management (IAM)? In the past, IAM was focused on...

View Article


Answer These Cybersecurity Questions & We Will Tell You If You’re...

.qmn_quiz_container .qmn_btn, .qmn_quiz_container .btn {height: auto; width: auto;} .qmn_pagination.border {border: none !important;} .qsm-quiz-container.qmn_quiz_container.mlw_qmn_quiz,...

View Article

IdentityNow Helps Online Retailer Revitalize Its Identity Management Program

Founded just after the pop of the dot-com bubble, this U.S.-based home goods retailer sells more than 14 million household items from thousands of providers. To create an exceptional online shopping...

View Article

Identity Imperatives for IT Modernization

Chances are, no matter the size of your organization, you’re being challenged to meet shifting expectations of your users. Across industries and geographies, we’ve seen how organizations have used...

View Article

The Step-by-Step Guide to CCPA Compliance

California is just one in a string of many states to enact legislation that puts the responsibility of privacy in the hands of businesses. There are 54 days until the CCPA takes effect, but who’s...

View Article


Balancing Zero Trust with a strong identity strategy and AI

The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what...

View Article

Enable Business Growth and Strengthen Security

Consumers are demanding rapid adoption of a purely digital landscape, and at the center of today’s challenges are compromised identities. What do threat actors use to gain access to your data?...

View Article


Moving Toward Effective RPA Governance

Software bots are swarming onto enterprise networks at an astounding rate, and for good reason. These bots can free staff from mundane and repetitive tasks, tirelessly process transactions, manage...

View Article

Image may be NSFW.
Clik here to view.

2019 Market Pulse Survey: Good Bot, Bad Bot

There are two sides to every coin. This analogy is especially true when we talk about the ever-present use of software bots in organizations today. On one side of the coin, we can all agree that bots...

View Article


The Importance of Identity in a Hybrid IT World

If your organization is like many, you’re moving more and more applications to the cloud or introducing numerous APIs into your environment as a part your digital transformation. Wherever you are in...

View Article

Payment Technology Provider Achieves Automation & Compliance with SailPoint

This German company assists over 34,000 customers in one hundred different countries with electronic payment transaction solutions and risk management. As a financial services company that is newly...

View Article

Better Metrics with Prometheus

Generating millions of metrics from microservices and infrastructure is easy (perhaps too easy). Collecting those metrics and sculpting them into meaningful dashboards and alarms is a challenge...

View Article
Browsing all 193 articles
Browse latest View live




Latest Images