Skip to Main Content

Customer Stories

Why you should migrate from IdentityIQ to SailPoint Identity Security Cloud  

 Authored by Chris Gossett, SVP, Technology Services  On-premises solutions can give you control of all your infrastructure and the power to customize your configurations. While powerful, on-premises solutions have their limits and can impact budgets, resource consumption, availability, scalability, and more. For example, organizations may struggle to find appropriate staff […]

SailPoint Identity Security Cloud: Most common questions

For many organizations, the cloud is the future. As applications, databases, and services shift to cloud platforms, it means security must also. Luckily, any organization already invested in SailPoint IdentityIQ on-premises identity management solutions has a head start. They can migrate almost seamlessly to SailPoint Identity Security Cloud, maintaining work […]

FedRAMP ATO process and timeline: SailPoint’s 5 step journey

The Federal Risk and Authorization Management Program (FedRAMP) is a U.S. government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP authorization process is designed to ensure that cloud services used by federal agencies meet the government’s stringent security […]

Reducing risk and increasing compliance through non-employee risk management

What good is the strongest door lock if all the windows in your house are unlocked and not monitored?   Unfortunately, that’s the situation for too many organizations when it comes to lifecyle management and risk management of non-employees. For example, a recent PwC Survey found that only 40% of survey […]

Using identity to reduce the burden of managing SaaS sprawl

Software-as-a-service (SaaS) solutions can be a huge improvement over traditional IT solutions in many ways, from cost and scalability to easier deployment and maintenance. Those benefits (and others) are helping to drive rapid growth in the SaaS market, which is projected by Gartner to top 16% in 2023.   But with […]

Voices of experience – What’s the role of a cloud-first approach to identity security?

Managing cyber security for an organization is an ongoing process that evolves as an organization’s infrastructure, applications, technology, and user base evolves.  For many organizations, cloud is an important part of that evolution. Some organizations have gone fully to the cloud with applications and data; others are still wholly on-premises, […]

Voices of experience – Best practices for initiating an IAG project

Most companies do not doubt that implementing identity and access governance in their organization might be a good idea. But what’s the best way to do it?  By following the advice of those who have gone before. Specifically, at Navigate 2022 in London, IT leaders from various industries recently shared […]

Voices of experience – real-world benefits of identity security 

Regardless of what industry you’re in, identity security must be a component of your overall cyber security strategy. Identity security is a critical line of defense against cyber threats, enabling the management and governance of access for every digital identity in an organization.  Digital identities, such as email addresses or […]

Voices of experience – Industry trends driving the need for Identity and Access Governance (IGA)

From digital transformation to cloud computing to the Internet of Things, to employees using their own devices and working remotely worldwide, today’s organizations need to manage more IT connections across more devices from more places.  Yet all these “things” accessing other “things” increases the security risk and the possibility that […]

Voices of experience – Why IT leaders consider identity security essential to their business

When is cyber security not just security? When it’s identity security.   While good cyber security is critical for protecting data and avoiding online attacks and hacks, some security solutions can deliver increased security and much more. In fact, identity security enables a broad range of values beyond basic access management […]