{"id":69400,"date":"2023-10-04T05:50:59","date_gmt":"2023-10-04T11:50:59","guid":{"rendered":"https:\/\/www.sailpoint.com\/?p=69400"},"modified":"2024-06-18T22:30:46","modified_gmt":"2024-06-19T04:30:46","slug":"what-defines-next-gen-identity-security","status":"publish","type":"post","link":"https:\/\/www.sailpoint.com\/blog\/what-defines-next-gen-identity-security\/","title":{"rendered":"What defines \u201cnext gen\u201d identity security?\u00a0"},"content":{"rendered":"\n

Our heritage is defined by our ability to shape and reshape identity security to fit the constantly changing needs of our customers. Grady Summers laid that out clearly in his recent blog post<\/a>. This is what it takes to be the leader \u2013 you\u2019ve got to lead, you\u2019ve got to stay on your front foot, you\u2019ve got to constantly push the envelope.  <\/p>\n\n\n\n

So, when I sit here and think about our next evolution as a company and as the leading technology in this space, a question comes to mind: What \u201cshould\u201d next-gen look like?  Anyone can claim they deliver a \u201cnext-gen\u201d solution, but what does that mean in the context of enterprise identity security? <\/strong> <\/p>\n\n\n\n

I look at it like this: what do our customers need to address today \u2013 and tomorrow? What are the must have\u2019s? And most importantly, what business value does it deliver?   <\/p>\n\n\n\n

First \u2013 our customers\u2019 needs<\/strong> <\/p>\n\n\n\n

There is nothing about the enterprise identity security challenge that screams \u201cgive me something good enough\u201d to address my needs. These are complex, highly sophisticated, often highly regulated enterprises. There is a lot going on every single day to keep these companies moving fast. The key is to deliver a solution that takes on the complexity on behalf of customers so that what they see is simplified but sophisticated, administered with ease.  <\/p>\n\n\n\n

At the same time, the balance between speed and security needs to be tightly orchestrated. And the depth of security policy has to address the following:  <\/p>\n\n\n\n