recent blog post<\/a>. This is what it takes to be the leader \u2013 you\u2019ve got to lead, you\u2019ve got to stay on your front foot, you\u2019ve got to constantly push the envelope. <\/p>\n\n\n\nSo, when I sit here and think about our next evolution as a company and as the leading technology in this space, a question comes to mind: What \u201cshould\u201d next-gen look like? Anyone can claim they deliver a \u201cnext-gen\u201d solution, but what does that mean in the context of enterprise identity security? <\/strong> <\/p>\n\n\n\nI look at it like this: what do our customers need to address today \u2013 and tomorrow? What are the must have\u2019s? And most importantly, what business value does it deliver? <\/p>\n\n\n\n
First \u2013 our customers\u2019 needs<\/strong> <\/p>\n\n\n\nThere is nothing about the enterprise identity security challenge that screams \u201cgive me something good enough\u201d to address my needs. These are complex, highly sophisticated, often highly regulated enterprises. There is a lot going on every single day to keep these companies moving fast. The key is to deliver a solution that takes on the complexity on behalf of customers so that what they see is simplified but sophisticated, administered with ease. <\/p>\n\n\n\n
At the same time, the balance between speed and security needs to be tightly orchestrated. And the depth of security policy has to address the following: <\/p>\n\n\n\n
\n- All enterprise identities \u2013 spanning both employees and non-employees, including contractors, software bots, third-parties, etc. <\/li>\n<\/ul>\n\n\n\n
\n- All levels of access \u2013 across sensitive and regular user access <\/li>\n\n\n\n
- All critical applications and data \u2013 both cloud and on-prem <\/li>\n\n\n\n
- With management of access, down to the entitlement level <\/li>\n\n\n\n
- And access granted on an as-needed or \u201cjust in time\u201d basis <\/li>\n<\/ul>\n\n\n\n
The parameters I just described are constantly changing as each identity joins, moves, and eventually leaves the business. Multiply all of that change by the number of apps, data, and entitlements each identity has, and the ability to manage it all becomes exponentially harder, if not impossible if only managed by humans alone. Next-gen identity security has to be fueled by AI\/ML – this is table stakes. There\u2019s no way any large enterprise can handle the level of accelerated change happening across the business without the aid of automation. Through continuous machine learning, we fully believe AI will absolutely trump traditional convergence in this market and underpins true next-generation identity security. <\/p>\n\n\n\n
Second \u2013 what are the must have\u2019s for the next-gen identity security solution?<\/strong> <\/p>\n\n\n\nIt needs to be driven by policy \u2013 not roles \u2013 to determine if and when access is granted, to what degree, and within what timeframe. We\u2019ve moved far beyond simply granting access and assuming good intent, that that access will be used in the right way, at only the right time, no more, no less. Any access point can become a point of entry for an adversary at any given time. For that reason, enterprises need the ability to create a dynamic trust model that is context aware, with policy as the blueprint. Arming them with the intel needed to grant access just in time, and then shutting down that access when it\u2019s no longer needed. All of this needs to be built on a platform, so that enterprises can build an identity security foundation that fits their unique business needs, delivering extensibility and scalability on repeat. <\/p>\n\n\n\n
And third, what business value does next-gen identity security deliver?<\/strong> <\/p>\n\n\n\nFor starters, peace of mind. That every enterprise has a trusted technology ecosystem, one that allows the business to flourish as quickly and as seamlessly as possible. Next-gen identity security should ultimately equip every enterprise to effortlessly manage and secure their identities at any speed, at any scale. The outcome of that is a business that can compete fiercely, can grow and evolve at any pace, and can drive business acceleration that enables every identity to do their best work, securely and efficiently. <\/p>\n\n\n\n
This is how we define next-gen identity security at SailPoint. We\u2019re ready to reveal how we plan to deliver on this vision during Navigate<\/a> next week and hope to see you there. In the meantime, keep a close eye on this space as we get ready to publish the final installment of this blog series, authored by our leader and founder, Mark McClain where we reveal our future trajectory. <\/p>\n","protected":false},"excerpt":{"rendered":"Our heritage is defined by our ability to shape and reshape identity security to fit the constantly changing needs of our customers. Grady Summers laid that out clearly in his recent blog post. This is what it takes to be the leader \u2013 you\u2019ve got to lead, you\u2019ve got to […]<\/p>\n","protected":false},"author":130,"featured_media":69401,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[2,23],"tags":[],"library_type":[],"old-content":[],"pt_audience":[],"pt_acctStage":[],"pt_topic":[681,4895],"pt_vertical":[],"acf":{"sailpoint_post_related_articles":"","newsprblog_alt_title":"","newsprblog_featured_description":"","newsprblog_featured_image":""},"yoast_head":"\n
What defines \u201cnext gen\u201d identity security?\u00a0 | SailPoint<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n\n\n