The post Why prioritize identity security in the modern enterprise? appeared first on SailPoint.
]]>Keep reading for a recap of all the sessions, and to find out what salt (yes, salt) tells us about the future of identity security!
Identity is the core of modern security
Understanding the “who” has access to “what” has exponentially evolved in the variety of identity and access types, the volume of technology and data access points, and the velocity of change between the two. Wendy Wu, CMO, discussed how these changes have radically impacted enterprise security, and how enterprises can drive stronger cyber resiliency, placing identity security at the foundation.
Unified identity security drives business value
Ben Cody, SVP, Product, and Jaishree Subramania, VP, Product Marketing, shared details about SailPoint’s latest innovations to help organizations maximize investments. AI-powered application onboarding can help discover, connect, and provision the business applications in less time, while single-pane-of-glass visibility on risks, insights, and usage activities can help improve compliance.
Identity explained
Even identity veterans often struggle to define just what identity security is and why it is important for the enterprise. Neil McGlennon, Principal Architect, laid out a simple but solid foundation to help explain identity security, including why it’s essential to an overall enterprise security strategy, and how investments in identity security can reduce risk and drive business value.
The power of AI
The reactive approach to identity security is no longer sustainable. To keep organizations secure from the ever-growing and changing cyber threats, SailPoint believes AI is needed to proactively identify risks and help IT teams and business stakeholders make more informed decisions. This proactive approach delivers a standardized way to measure risks and provides enterprise-wide visibility that goes beyond human capacity. Erik Huckle, Head of GenAI and LLM Product Management, discussed the power of AI and how organizations can harness it to solve real-world identity security problems.
Going further with identity
Organizations across industries are harnessing the power of unified identity security to achieve remarkable results. From accelerating time to market by 20-30% on average to experiencing $1M+ in annual cost savings typically, the business impact of a robust identity security program is undeniable. Chris Gossett, SVP, Technology Services highlighted how AI-driven identity security is transforming the way businesses operate, and how many of the world’s largest, most complex organizations are taking their identity security program to new horizons.
ADP shares its identity security journey
Meredith Blanchar, Chief Customer Officer, sat down with Prasad S. Tamahankar, Director of Information Security at ADP, to chat about ADP’s identity security program, the goals and business drivers that led the company to SailPoint, and how identity is shaping ADP’s security program.
The future of cybersecurity and identity
Deloitte executives joined Dave Schwartz, SVP, Global Partners, for an insightful fireside chat on assessing cyber maturity and its impact on organizational success. They discussed key indicators of high-performing companies, the alignment of cyber initiatives with business objectives, and the evolving identity security landscape, as well as how managed services, automation, and AI can enhance efficiency and user experience while meeting the increasing expectations in identity security.
Customer value case studies
Quantifying the value of a world-class identity program can be challenging with multiple stakeholders, messy data, and a plethora of use cases. SailPoint’s dedicated team of ex-CFOs, bankers, and management consultants focus on helping our customers develop executive-level business cases through a collaborative process. Suhail Malhotra, Senior Director, Value Strategy, walked through examples of how some SailPoint customers have realized value from their identity security programs.
Spoon, cellar, shaker: What an edible rock can tell us about the future of identity
Finally, just as salt can make or break a dish, identity is the crucial component that a new wave of security strategies depends on. Mike Kiser, Director of Strategy and Standards, explored the parallels between salt and identity, extracting lessons from the journey of salt from recipe to kitchen to dining table, and applying those lessons to describe the future of identity.
If you want to dive into the sessions further, all the IdentityTV sessions are available to replay on-demand!
The post Why prioritize identity security in the modern enterprise? appeared first on SailPoint.
]]>The post What’s new at SailPoint? Glad you asked… appeared first on SailPoint.
]]>We kicked off the season with several product updates. We announced new Data Access Security and Non-Employee Risk Management capabilities within the SailPoint Identity Security Cloud, offering our customers better visibility, efficiency, and security. Additionally, we launched our new AI-powered application onboarding capability to simplify application integration. Last, but definitely not least, we also announced expanded connectivity support for enterprise and custom applications, with updates to SailPoint Connectivity.
Keep reading for a summary of each announcement.
Updates to our Data Access Security and Non-Employee Risk Management add-on capabilities within SailPoint Identity Security Cloud offer customers increased visibility and security across all varieties of identity types and their access to critical data, enabling a strong enterprise-class identity security program.
Designed as a cloud-native solution on the Atlas platform, SailPoint Data Access Security provides customers with holistic visibility of access to unstructured data. SailPoint continues to expand its Data Access Security capabilities with integrated data access certification, activity monitoring, and sensitive and regulated data classification. With new resources at their fingertips, customers gain improved visibility and deeper context on critical data to help secure sensitive information as a core component of their identity security program.
SailPoint Non-Employee Risk Management enables customers to better manage identities and access for third-party non-employees, an emerging threat vector for enterprises. New updates include QuickStart templates and language expansion to drive better time-to-value and productivity for customers, helping to rapidly establish configurations for common non-employee identity types.
SailPoint’s new innovative AI-powered application onboarding capability automates the costly and time-consuming onboarding process, reducing time and the complications typically associated with application onboarding.
The capability automatically discovers applications, increasing visibility across the environment. After applications are discovered, administrators can easily choose the connection method from hundreds of options, or get smart, AI-driven recommendations to fulfill access security needs for each application. SailPoint application onboarding also generates AI-powered recommendations that can help map identities to accounts. Identifying these correlations can be time-consuming and automating the process will dramatically streamline the onboarding process and is expected to reduce the mapping time by up to 70% on average.
With this capability, SailPoint will simultaneously deliver faster time-to-value, secure business applications, and improve the user experience.
SailPoint Connectivity, a key component of the unified SailPoint Atlas platform, now supports connectivity for more than 1,100 enterprise applications and 20,000 custom applications. SailPoint Connectivity allows customers to extend, connect, and integrate core identity security capabilities with the critical business applications they use every day, all under a single identity umbrella. This is essential in jumpstarting identity security time-to-value.
The post What’s new at SailPoint? Glad you asked… appeared first on SailPoint.
]]>The post ASDA reveals how SailPoint supported the supermarket to build a new, nationwide identity security program appeared first on SailPoint.
]]>In an engaging Q&A, Simon shares how his team matched the pace and velocity of a changing identity landscape and digital ecosystem, all while continuing to enable the business. He also revealed how, as one of the UK’s largest supermarket retailers, ASDA implemented a robust identity program designed to help improve compliance, user experience, and employee lifecycle management across 138,000 users, outlining key steps and pitfalls to avoid along the way.
Read on to discover ASDA’s successful transformation journey to a unified identity security program.
Hi Simon, thanks so much for taking the time to share your story. Let’s begin with the basics: please give us a little background on the ASDA brand.
ASDA is Britain’s third-largest supermarket chain, with around 829 stores and £20.4 billion in revenue. We’re a longstanding company based in Leeds in the UK, and we were previously owned by Walmart before a takeover in 2021.
Walmart is an enormous organisation with annual revenues of about half a trillion. It does lots of things very well, but its size can also breed inflexibility and you often simply have to follow what the leadership tells you to. That meant at ASDA, we had little freedom to manage our own identities or IT infrastructure. Now that we’ve separated from Walmart, we’ve been effectively building new infrastructure from scratch, which is a big ask for a £20bn company.
Could you tell us more about the demerger from Walmart, and where you are in your identity program today?
Of course. Previously, our identities were all Walmart identities, part of their on-premises active directory (AD) forest. So, when we left, we had to set up a completely new identity for each employee – all 138,000 – the majority of which are frontline staff, people in shops and warehouses, and so on. We also have around 6,000 contractors, which we manage on a separate system. Today, all of these people are now logged into Workday, integrated with SailPoint, and SailPoint ServiceNow for request management and more.
Most of our products today are cloud-based rather than on-premises. Similarly, many businesses across Europe are shifting to the cloud for a variety of reasons – could you tell me what was behind ASDA’s decision to do so?
Lots of organisations today talk about being cloud-first, but we made a conscious decision to become almost cloud-only. The cloud offered an interesting opportunity for us to completely reshape our identity management – it was like a greenfield site for a £20bn company.
Early on, we decided we didn’t want to tie ourselves down to infrastructure, so this immediately lent itself to using software as a service (SaaS) or cloud-hosted solutions. Then, looking back to my experience as CISO and sponsor for the identity program at (UK supermarket) Morrison’s, we looked at SailPoint solution as a potential tool. Fast forward, I realised that it fit perfectly with ASDA’s new infrastructure and the future of where we’re heading. So, we went with SailPoint Identity Security Cloud and so far, integration has been straightforward – it’s gone really great.
What was the sign-off process and the building of the business case like for your new identity program? Are you being held accountable for whether you’ve achieved your initial goals?
It was important to me to make sure we had the right funding upfront, so I had to clearly demonstrate the value of what it is we’re delivering and to keep the board informed.
We have a monthly security government forum where I present and report on all sorts of security risks. Fortunately, senior colleagues haven’t been too picky regarding progress against my program scope, and only really want to hear about anything that could go wrong and the plans to mitigate against it. It’s really been about risks and issues and expanding on progress, rather than having to answer to what we’ve done.
As an identity expert, could you explain the importance and business value of identity to those who are unfamiliar with it?
As a CISO, what I care most about is any security risks to the business. Cyber incidents and data breaches are a big concern, but so is identity. There are some areas of our business where we have a really high turnover of staff, for instance, over Christmas we take on thousands of short-term workers. Even if we only need them to work for two days, but it takes us a week to give them an identity on our systems, they won’t be able to do anything except twiddle their thumbs and we’ll be paying them for nothing. So, we need to efficiently onboard people to make sure people quickly have the correct access rights.
A lot of access provision in the old-world environment was largely done manually. I don’t know how many people Walmart has working on identity alone, but I think they have almost 2,000 security staff. Most of us don’t have the resources to replicate that, so we need to rely on technology and services like SailPoint.
How are you reaching identity to the day-one retail employees, presumably recruited on quite short notice, who need to have privileged information supplied?
We’re doing that effectively through the local management, whether that’s the general store manager or team leaders in the depots. We have lots of materials like knowledge articles and scripts, and we have training facilities that we can use to test these things out.
You touched on contractors earlier, could you explain what ASDA is doing in regards to non-employee identity?
It’s been a bit of a battle in all the CISO positions in my career. I’d always prefer our contractors just went to our HR system because it already contains an identity infrastructure, but HR teams often disagree.
At ASDA, we ultimately decided to adopt SailPoint’s Non-Employee Risk Management tool, which is effectively designed for managing people who are not full employees but still need access to systems. Fortunately, if you already use SailPoint Identity Security Cloud implementation it is straightforward.
Great. Now, let’s move on to a more obvious question. Please share with us three learnings or identity security best practices with our audience.
This might not come as a surprise, but one of the biggest lessons I’ve learned is the importance of data quality. And most of the data quality issues we’ve had have been associated with the actual ownership of that data. We had to build a full set data set correlated from multiple data sources, so getting clean data, and an agreement about whose responsibility that data is, is really important.
Next up is change control, or technical change control to be specific. One of the key lessons I learned from my role at Morrison’s is that we didn’t focus enough on bringing employees with us, we didn’t spend enough time on training or business change management. You can’t treat identity as a technology project, you have to bring your colleagues with you and ensure they’re technically educated so that the C-suite workers know their responsibilities, and the everyday workers know what to do too.
The third essential pillar is finding the right partner for your identity program. Providers that can demonstrate their experience, have strong references around how they are to work with, are responsive, and seek out problems and help you to solve them in advance are all positive indicators. I’ve worked with SailPoint in the past and this was important in our decision to work with them at ASDA, too. I know we can just ask them at any time to help fix an issue for us, and they’ll do so.
And what about pitfalls that people need to look out for?
The first one is getting engagement right. We’ve discussed engagement with senior leadership, which is clearly important for things like funding. But it’s also important to engage with the business at the lower level, because we’re going to end up integrating staff with hundreds of complex applications and we can never be sure of how they’ll use them – where they connect from, what devices they use, under what circumstances they might be connecting, do they need temporary access or delegated access, etc. In the past, we waited for colleagues to come to us, but they didn’t, and then they expected everything to magically work.
Also, as I’ve mentioned, another pitfall is treating identity as purely a technology project, like a tool you can just plug in and play. There are a lot of processes and team structures to build around it, and this is why it’s so important to have the right specialist partner. This way, you can make sure you’re treating it as a proper program. One of the mistakes I’ve previously encountered is taking a bad process and a good piece of software and trying to change the software to meet the bad process. It needs to be the other way around – staff must align with the software to ensure the system runs well.
Now, it wouldn’t be a technology discussion without touching on AI. Given the scale and the complexity that you’re dealing with, where do you see AI in ASDA’s future?
There are a couple of areas in which I see it bringing obvious benefits to us. We’ve got our basic infrastructure in place, around 10 big applications that via SailPoint ServiceNow are integrated into SSL and SailPoint. But we’ve still got hundreds of much less significant applications to integrate. So, using AI to automate, or at least help speed up, some of the onboarding of those applications would be really helpful in terms of time, money, and resources.
Role mining (the process of analysing business data to group users and access permissions and simplify the review process) is another big use case. Employees only tend to understand their section of the applications and don’t know what happens elsewhere. Using AI to role mine and map would be very helpful.
Discover more customer stories.
The post ASDA reveals how SailPoint supported the supermarket to build a new, nationwide identity security program appeared first on SailPoint.
]]>The post Gain real-time visibility of appropriate access to data appeared first on SailPoint.
]]>In today’s data-driven landscape, modern enterprises depend on their business data to boost productivity and drive innovation. From AI initiatives to business intelligence, having the right access to the right information is crucial for data-backed decision-making.
But what happens when organizations lack full visibility of who is accessing data and the appropriateness of that access? Potential benefits could be significantly diminished. Without this visibility, organizations risk data leaks, delayed detection of breaches, and potential compliance fines due to inadequate tracking of data access.
To enable organizations to leverage their data safely and securely, identity security teams must ensure that only authorized individuals have access to business-critical data. They must monitor, track, and control how this data is used and by whom, ensuring any changes to data and access are properly recorded.
Introducing Data Access Security Activity Monitoring
We are excited to introduce Activity Monitoring as part of SailPoint Data Access Security. This feature delivers real-time visibility into data access, allowing Identity Security teams to monitor access to critical data such as sensitive employee or customer information, trade secrets, financial data, or health information.
Data Access Security tracks all actions across governed applications, providing detailed information about the identities and actors involved. Administrators can explore how sensitive data is used, audit changes to data or access privileges, and trace the evolution of data access over time — all through a single pane of glass.
Reduce Risky Access with Enhanced Identity Context
Knowing who is accessing sensitive data is crucial to understanding how it is being used throughout the organization’s different business units, departments, and processes. It is also critical to detect unauthorized or inappropriate access.
Data Access Security correlates actor information with Identity Security Cloud’s identity cube information, providing rich context about the users performing the operations, including details like their organizational unit, access profile, location, or lifecycle state. This helps to distinguish between legitimate access that drives productivity and unauthorized, risky access — whether from employees, contractors, or machines, such as service accounts.
Monitor Risky Access and Access Changes Made on High-Risk Data
Whether dealing with a customer’s personal information or crucial company assets, it is imperative to restrict access to sensitive data to authorized individuals. Data Access Security’s built-in data classification capabilities spotlight activity on highly sensitive and regulated content.
This enhanced data context helps teams prioritize high-risk access. It enables identity security administrators to focus their monitoring on risky actors who are accessing their organization’s crown jewels. It also helps compliance managers quicky and easily report on any access changes made to sensitive and regulated data.
Fortify Access Integrity and Mature Security Posture
Ensuring that all access is granted through authorized governance processes is crucial for maintaining sustainable access models and improving data security. When access is granted directly to data resources — or by manipulating security groups outside of organizational processes without appropriate review — it weakens the overall security posture.
Data Access Security Activity Monitoring helps identity security administrators and business owners detect such native changes immediately, enabling them to restore governance and maintain secure access models.
Streamline Incident Response, Forensics, and Remediation
Proactive governance is the best way to minimize the impacts of data breaches. Creating a sustainable least privilege access model and a continuous governance strategy helps ensure the right access is granted at the right time, containing the potential blast radius if an identity is jeopardized. But when an incident does occur, a swift response and remediation are of the utmost importance.
Data Access Security provides detailed forensics capabilities, enabling administrators to investigate incidents, analyze real-time access, search for access patterns, and retrospect past incidents. With a complete view of the data accessed, data security teams can quickly assess potential damage, helping them reduce disruption to the business.
Data Access Security Activity Monitoring empowers identity security teams with comprehensive visibility and deep insights into data usage, enabling administrators to:
See how Data Access Security helps keep your sensitive data safe
Visit the Data Access Security page or request a live demo
The post Gain real-time visibility of appropriate access to data appeared first on SailPoint.
]]>The post Connectivity: The secret weapon to identity security success appeared first on SailPoint.
]]>When organizations don’t apply core identity security principles – such as access requests, access approvals, certifications, and insights – to business applications, no matter what they are, how they’re delivered, or where they reside, it’s hard to get a clear view into access, enforce consistent policies, detect threats, and understand risks.
That’s where SailPoint Connectivity comes in, delivering comprehensive solutions that give our customers the power to manage access to any application. Think of us as your personal identity security arsenal with a cadre of solutions specifically designed to synchronize applications and data sources, jumpstart your identity security journey, and help confidently and securely manage an identity’s access across the organization.
Comprehensive connectivity for every application
SailPoint Connectivity is a key component of SailPoint’s Atlas platform. Our singular focus on extending, connecting, and integrating core identity security capabilities with business applications translates into comprehensive, actionable security that quickly delivers deep access governance for both cloud and on-premises apps.
This gives enterprises the ability to quickly govern and secure access to applications across any IT environment and throughout the application lifecycle. Every customer has a different application portfolio. SailPoint’s connector library supports customer needs to achieve connectivity for:
SailPoint’s connectivity depth and breadth helps us accomplish this, including:
Flexible connectivity for any IT environment
SailPoint’s Connectivity solutions cover SaaS, on-premises, and hybrid IT environments to help organizations navigate ongoing digital transformation challenges, including:
Value-add connectivity for every business
The value of any identity security program is defined by its ability to help organizations quickly implement best practices, adapt to changing IT environments, integrate with and secure applications, and maintain compliance. SailPoint Connectivity was designed to deliver this and more—and that translates into tangible business value for our customers.
SailPoint Connectivity is your secret weapon to help manage access to important resources, improve security postures, satisfy compliance requirements, and get a clear view of access across the organization.
Learn more
SailPoint Connectivity gives organizations the ability to quickly apply identity security to the applications they use every day. The more applications for which organizations can manage access, the more identities they can govern, and the more compliant they are. Find out more about how we can help you jumpstart your identity security journey: https://www.sailpoint.com/products/connectivity-and-integrations/.
Author: Amy Lemen, Sr. Product Marketing Manager – SailPoint Connectivity
The post Connectivity: The secret weapon to identity security success appeared first on SailPoint.
]]>The post Celebrating Pride Month at SailPoint appeared first on SailPoint.
]]>Tell us about yourself. How long you have worked at SailPoint, and what’s your role?
Xavier: My name is Xavier Aguilar (He/Him/His) and I have been with SailPoint for about three years now. I am a member of our Deal Desk on the revenue operations side of SailPoint. We provide valuable assistance to our sales teams, as well as act as liaisons between our legal, products, and pricing teams (to name a few).
Star: My name is Star Wang. I’m based in Sydney and have been working in our talent acquisition team for our APAC Go-To-Market team for over two years.
Lisa: My name is Lisa Badalamenti (She/Her/Hers) and I’m new to SailPoint, two months in and loving it! I’m a Program Manager for the Partner Education Sales and GTM team.
How do you celebrate Pride Month?
Xavier: I celebrate Pride by simply existing. I am unashamed of holding my partner’s hand in public or showing him affection in front of our family and friends. I proudly wear my SailPoint “Y’all Means All” shirt when I go grocery shopping. Sure, I get the occasional sneer or glare from strangers, but it is important for me to not let that kind of attention affect me negatively and it pales in comparison to all the compliments on it too. I know that even the smallest of lights can shine brightly amongst the deepest darkness.
Star: I’m a member of Sydney Frontrunners, who provide encouragement, support and community to LGBTQ+ people and friends with regular running and walking activities. I am celebrating Pride Month by joining club members for Saturday morning runs. We also are doing Pride 5km Walk / Run to raise funds for PrideAbility, a social support group for LGBTQ+ people with intellectual disability on Saturday, June 29th. My wife is also going to join our after sessions to show her support.
Lisa: My wife, son and I attended our local town’s Pride festival and read books about diverse families throughout the month.
What does Pride mean to you?
Xavier: Pride, to me, means living your authentic self without shame. A sense of self-respect. It is important for me to be visible in society. Ignorance of the unknown is a massive contributor to anti-LGBTQ+ mindsets. We are not monsters set on destroying the world, we are human beings. I believe that if others can see that I am happy being alive, being me, that love, and acceptance can unite us as a stronger society.
Star: Pride to me means promoting and increasing the visibility of the LGBTQ+ social group. That makes me even more satisfied with my work and proud of my organization.
Lisa: My identity has always been a prideful thing that I carry, throughout my personal life and work life, and has influenced my professional journey by continually keeping a focus on including diversity in the workplace both for my immediate team and the company itself. Pride to me means being your authentic self, showing up however you are and whoever you are without regard for what others think. It means being true, happy, and honest with yourself and the world.
What encouraging words would you share to people about Pride month?
Xavier: You have the courage and strength to create the life you deserve; never give up.
Lisa: Pride month is a great time for recognizing our differences and similarities, and that ultimately love is love and this is a time to celebrate that!
The post Celebrating Pride Month at SailPoint appeared first on SailPoint.
]]>The post Congratulations! AES wins CSO Award for transformative identity security with SailPoint appeared first on SailPoint.
]]>“The stakes grow higher every day for security leaders and their teams, and this year’s CSO Awards honor the very best efforts to tackle challenges from an expanding threat landscape,” said Beth Kormanik, content director for the CSO Conference & Awards. “From devising new threat detection methods and cyber analytics to initiatives addressing AI threats, zero trust, and data protection, these projects are at the forefront of innovative security thinking and represent true business value for their organizations. We congratulate the winners and look forward to celebrating them at the CSO Conference & Awards this fall.”
Redefining cyber foundational excellence
In today’s digital age, four out of five data breaches can be traced back to digital identity. Despite this alarming statistic, 30% of organizations have still not started their identity security journeys. Many organizations grapple with a fragmented identity experience across their workforce. These companies often rely on manual and decentralized processes to manage access and governance to different user groups within their organization. AES, however, has pioneered an innovative approach to identity security. Its extensive program has shed light on how frequently cyber-attackers target companies, prompting the team to focus on foundational identity security as a key line of defense.
By centralizing its identity platform for access and identity controls across all users, AES leveraged SailPoint Identity Security Cloud (ISC) as a strategic catalyst for business transformation, innovation, and security resilience. AES provides its business partners with appropriate access to enabling technology and collaboration tools, while ensuring enterprise security controls are in place. AES’ ability to manage digital lifecycles end-to-end and integrate with enabling technologies underscores its maturity and excellence in identity security.
A unique and integrated approach
AES’ unique approach is rooted in its commitment to providing a holistic, standardized identity security solution that caters to all user types within its organization. By integrating ServiceNow and SailPoint, its team has streamlined provisioning and deprovisioning processes globally. This has improved the timeliness and efficiency of providing necessary access rights to all users, including employees, contingent workers, and contractors.
Before the automation of account creation and management, verifying and creating user accounts required manual approvals. This process was handled by Regional Digital Technical teams, each following regional methods for onboarding and offboarding users, which could take up to several days. With SailPoint, AES has reduced this total time to under 4 hours on average globally, accelerating the onboarding and management of resources efficiently and without manual intervention.
AES offers end-to-end digital lifecycle management for employees, contingent workers, and contractors. This facilitates a simplified, secure, and compliant Day 1 onboarding process, as well as automated provisioning and deprovisioning processes through seamless integration of ServiceNow and SailPoint.
Key features of AES’ integrated identity security solution
Simplified Onboarding: AES’ integrated solution automates the creation of user accounts, provisioning of resources, and assignment of permissions, facilitating a smooth and expedited onboarding process for all user categories. This not only accelerates time-to-productivity for employees but also expedites access for contingent workers and contractors to the tools and systems they need to contribute effectively. When a new employee, contingent worker, or service contractor joins the organization or requires access to specific resources, SailPoint provisioning workflows integrate with Workday and ServiceNow to grant the necessary access rights and permissions. Similarly, when a user leaves the organization or no longer requires access, SailPoint triggers deprovisioning workflows to revoke access and remove user accounts automatically.
Secure Access Management: Of course, security is paramount to AES’ strategy. Leveraging the combined capabilities of ServiceNow and SailPoint, AES enforces least privilege access principles and dynamically adjusts access rights based on changes in user roles or employment status.
Compliance and Audit Readiness: AES’ integrated solution enables comprehensive compliance and audit readiness by capturing detailed audit trails and reports of provisioning and deprovisioning events. This helps the organization’s identity security practices align with regulatory requirements and internal policies, providing support during audits and assessments.
Challenges and future directions AES recognizes that there are still challenges to overcome, including managing the ever-evolving landscape of cyber threats, ensuring compliance with a growing body of regulations, and maintaining user satisfaction while enforcing strict security controls. Looking ahead, AES plans to further enhance their identity security strategy by incorporating advanced analytics for real-time threat detection, exploring the use of artificial intelligence for predictive threat modeling, and expanding its identity and access management framework to encompass emerging technologies and platforms. Through these efforts, AES aims to stay one step ahead of cyber threats and continue to safeguard its digital identities.
The post Congratulations! AES wins CSO Award for transformative identity security with SailPoint appeared first on SailPoint.
]]>The post SailPoint application onboarding: AI-powered lifecycle management for enterprise applications appeared first on SailPoint.
]]>That sounds great in theory, but onboarding applications in real life is mostly manual and takes a long time to accomplish. Imagine securing access to Microsoft Entra, SAP, or ServiceNow for hundreds of internal users and matching an identity’s access to a particular application. And to make it more challenging, most application owners understand the applications, but not how to govern access to them. All of this requires time and expertise, and that can stall an identity security program before it gets off the ground.
Introducing SailPoint® application onboarding
We want our customers to spend less time trying to discover and configure ungoverned applications and more time reaping the benefits of identity security. Enter SailPoint application onboarding – an AI-powered approach to help organizations efficiently manage the entire enterprise application lifecycle.
This new capability for SailPoint Identity Security Cloud is a direct response to customer requirements for the rapid extension of their identity security program to hundreds or thousands of applications, all powered by Identity Security Cloud.
SailPoint application onboarding leverages AI to accelerate and scale the process of onboarding customer applications, enabling customers to extend visibility and control over identity and access across their vast application landscape to easily discover and connect, configure, and manage access to any enterprise application.
Organizations can:
The value of AI-powered application onboarding
The value these new capabilities bring to our customers is about quickly governing and securing access for every identity and across any IT environment with a unified identity security platform that helps meet compliance requirements, knock out zero trust goals, and quickly realize value.
SailPoint application onboarding delivers on this promise, helping our customers:
SailPoint application onboarding is available now for Identity Security Cloud Business and Business Plus customers.
On the horizon: More efficient application onboarding in less time
We’re excited to introduce this new capability to our customers. But our commitment to helping enterprises experience further value and quickly apply identity security to the applications they use every day doesn’t stop there.
Identity security demands constant innovation to keep up with threats and meet customer expectations, and our multi-tenant SaaS platform helps us deliver quickly. As the SailPoint® application onboarding capability matures and adds new functionality, organizations will be able to:
Learn more
SailPoint application onboarding is part of SailPoint Connectivity— a key component of the SailPoint Atlas platform and the cornerstone of SailPoint’s extensibility strategy. Our comprehensive, actionable portfolio for any IT environment supports customer connectivity needs for more than 1,100 unique enterprise applications and more than 20,000 custom applications to deliver deep access governance in minutes for a clear view of access across the organization.
The post SailPoint application onboarding: AI-powered lifecycle management for enterprise applications appeared first on SailPoint.
]]>The post FedRAMP explained: Why it matters appeared first on SailPoint.
]]>Government agencies, critical infrastructure, and government contractors seeking a SaaS-based identity security solution must choose a FedRAMP-authorized cloud service provider (CSP) they can trust to advance their identity security program. We sat down with Ryan Cooney, Manager of Federal Security Compliance, to get the basics.
What is FedRAMP?
The Federal Risk and Authorization Management Program, known colloquially as FedRAMP, is a United States federal government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, emphasizing the security and protection of federal information and helps accelerate the adoption of secure cloud solutions. FedRAMP Marketplace maintains vetted cloud service offerings authorized for use by the federal government.
What does it mean that SailPoint is FedRAMP authorized?
It means that SailPoint Identity Security Cloud has achieved ‘FedRAMP Moderate ATO’ and is approved for use by the United States government. SailPoint built our SaaS suite on AWS GovCloud and complied with all 325 security requirements defined in the FedRAMP Moderate controls baseline. FedRAMP sets a high standard for security and meeting those standards demonstrates SailPoint’s commitment to customer trust and success.
What are the phases or steps to achieve a FedRAMP certification? An in-depth security assessment of the system was performed by an accredited third party to provide assurance of the FedRAMP platform security posture. SailPoint then underwent a comprehensive review and approval process with both its sponsor in the United States federal government and the FedRAMP Program Management Office.
Why should current and potential customers care if a vendor is FedRAMP authorized?
SailPoint has long been trusted to support the most sensitive federal agencies, critical infrastructure, defense industrial base, and top Fortune 500 companies. Now public sector customers or mission partners that handle federal data such as federal contractors and critical infrastructure can realize the benefits of using SailPoint’s FedRAMP SaaS solutions.
What can I expect from SailPoint around its FedRAMP authorization in the coming weeks and months?
Be on the lookout for SailPoint to release additional content regarding how our FedRAMP SaaS solutions can be used to meet your agency or federal contractor needs.
In the meantime, learn the critical aspects of choosing the right provider for your identity security program on our website.
The post FedRAMP explained: Why it matters appeared first on SailPoint.
]]>The post The identity security journey: Meeting customers where they are appeared first on SailPoint.
]]>However, beyond the overall goal of securing access to applications and data, enterprises might have varied short-term and long-term priorities. For instance, one large retail organization might want to increase onboarding efficiency, while a fintech business might want to empower and protect remote work. Another healthcare company might be focused on both. And here at SailPoint, that can all be in a day’s work.
So, how does one solution, SailPoint Identity Security Cloud, meet each organization’s unique needs at every step of their identity security journeys? Let’s take a look at a few examples.
Upgrading a business’s identity security is tough enough. But trying to do so without the support of tried and trusted experts can be a recipe for failure. That’s why at SailPoint we always provide tailored recommendations for an implementation partner who can support customers with their transitions.
A world-leading consumer goods manufacturer asked SailPoint to help it become the most connected business of its type in the world. The customer’s short-term goal was to establish an identity program and begin automating lifecycle activities. It also wanted to roll out a common set of applications across all operating companies and streamline the broader application suite.
To advance delivery and implementation of a robust identity security program, SailPoint brought together a group of internal and external experts from product management, SaaS engineering, and services, alongside executive leadership to collaborate on delivery scope, timelines, and value. The SailPoint team guided the customer and its chosen implementation partner through technical delivery practices and the initial performance assessments and scalability of SailPoint Identity Security Cloud, along with providing last-minute advice and support.
The customer soon enjoyed a smooth deployment and realization of their mission: a successful cutover from their legacy tool to SailPoint Identity Security Cloud and end-to-end automation. It quickly processed 500+ joiners and initiated 250+ leavers through SailPoint Identity Security Cloud, now managing over 100,000 identities in total.
Nordnet, a Scandinavian online bank, approached SailPoint to improve its usability, maintainability, scalability, and control of all access, as well as obtain “one source of truth” where all access can be viewed, managed, and secured in one place.
The bank went live with SailPoint Identity Security Cloud to specifically focus on Certifications and Access requests in their revamped Request Center. It resulted in a significantly quicker approval process, empowering the Nordnet team to easily manage, track, and review access for greater control. Mattias Karlsson, Process Owner of Access Management at Nordnet, said, “One of the focus areas was to improve usability and efficiency, which we have achieved, and gotten incredibly positive feedback from managers.”
Nordnet has achieved particularly remarkable improvements in its certification campaigns, trimming the completion time from 30 days to an impressive 18. The positive impact of these changes has reverberated throughout the organization. Marcus Montelius, System Manager at Nordnet, said, “We have had very positive feedback from our colleagues after our implementation of SailPoint Identity Security Cloud. The easy-to-use design for requests and certifications and the Slack integration have been very popular and much appreciated by our users.”
Montelius continued, “We have also improved drastically the implementation time of new integration with our internal application, compared to our previous system. This enables us to extend the delivery of applications and requestable accesses which results in less access management manual work around the company.”
A classic symptom across many enterprises today is the number of manual processes that they tend to persevere with. For a leading provider of end-to-end investment services, its Joiner, Mover, and Leaver (JML) processes required users to be manually onboarded and exited, while disjointed HR and core technology platforms were updated independently. These time-consuming manual tasks led to regular mistakes and delays, along with serious information security risks.
Fortunately, the business soon recognized that with SailPoint Identity Security Cloud, it could achieve greater control and process efficiencies over IT access management, particularly for JML. SailPoint now automates key actions within joiners, role changes, and user termination processes across their platforms and Active Directory. The company launched this across its two major domains and all user accounts are now managed through SailPoint Identity Security Cloud.
“Since the launch, we have been encouraged by the operational efficiency benefits that we are seeing as part of our staff Joiner, Mover, and Leaver processes,” said the company’s Head of IT Operations & Infrastructure. “We look forward to building upon this foundation over the coming year as we further embed SailPoint Identity Security Cloud into our individual applications’ access controls, enabling us to realize the full value of SailPoint Identity Security Cloud as a cornerstone of our identity security strategy.”
The power of a unified solution
The beauty of SailPoint Identity Security Cloud is that no matter the type of business or specific identity challenges faced, the solution is crafted to support customers today and throughout their journey, as identity needs and requirements grow in size, scale, and complexity. Four product modules provide customers with key capabilities and features to start their identity security journey: lifecycle management, compliance management, access modeling, and analytics. And with several add-ons designed to satisfy the most specific of identity security needs, SailPoint helps customers manage and secure every enterprise identity with greater ease while reducing overall risk.
Thousands of organizations worldwide use SailPoint Identity Security Cloud to manage and secure access to critical data and applications for every enterprise identity. So, wherever your enterprise is in its identity security journey, you can too. Learn more and start your journey today.
The post The identity security journey: Meeting customers where they are appeared first on SailPoint.
]]>