Hi [[ session.user.profile.firstName ]]

SailPoint

  • Date
  • Rating
  • Views
  • Kublai Khan, Blockchain & The Democratization of Identity
    Kublai Khan, Blockchain & The Democratization of Identity
    SailPoint Technologies Recorded: Oct 11 2018 50 mins
    Blockchain is already rife within the consumer world today. It has become the new independent federation of nations, not centralized but distributed. Could blockchain be equally effective within a B2B environment for securing the assets of the future? If so, what would it look like, how would we make it work, and what benefits would we see? Join SailPoint to discuss whether blockchain will revolutionize identity management.

    SailPoint’s CTO and CISO Darran Rolls discusses:
    - Where and how blockchain-related technology fits with identity management
    - How to evaluate blockchain’s potential impact on identity validation
    - Future scenarios where blockchain and identity management use cases may overlap
  • Taming the Tsunami of Bots, Apps, and Cloud using the Power of Identity
    Taming the Tsunami of Bots, Apps, and Cloud using the Power of Identity
    SailPoint Technologies Recorded: Oct 11 2018 39 mins
    The rapid adoption of software bots, cloud applications and cloud infrastructure has created new security gaps and issues for enterprises due to lack of proper access and governance controls. Using the power of identity, organizations can tame this unyielding tsunami into a wave that will propel you forward to realize a more secure, compliant and efficient infrastructure.

    SailPoint IdentityIQ 7.3 is continuing to push the boundaries of innovation by extending identity for all users, across all applications and data, reducing your organization’s risk profile while ensuring your identity governance strategy is always one innovation ahead.

    Watch this webinar to:
    - Manage, govern and control all digital identities including software bots and Robotic Process Automation (RPA)
    - Accelerate business value with rapid setup and application onboarding
    - Govern AWS and SAP platforms, from a single pane of glass
    - Deploy IdentityIQ in the datacenter or in a hosted cloud environment such as Amazon AWS or Microsoft Azure
  • The Must Do’s for Securing Health Data Files
    The Must Do’s for Securing Health Data Files
    SailPoint Technologies Recorded: Oct 11 2018 45 mins
    How confident are you in your ability to secure health data and other highly-sensitive information stored in applications and files? By combining identity governance and data access governance capabilities, provider organizations can significantly enhance their ability to thwart health data breaches. To learn how integrating these capabilities can improve your cybersecurity posture, join SailPoint and Identropy on a live webinar presentation.

    In this webinar, expect the following key takeaways:
    - Discover an how to identify sensitive data stored in files
    - Understand risky permissions and access models
    - Learn an effective approach for applying security policies and controls
    - Explore strategies for complying with regulations (HIPAA, GDPR, etc.)
  • Houston, We Have a Problem: Sensitive Data Orbiting Your Business
    Houston, We Have a Problem: Sensitive Data Orbiting Your Business
    Mike Kiser, Sr. Security Strategist, SailPoint Recorded: Aug 15 2018 28 mins
    Similar to space debris, data is orbiting enterprises at an alarming speed and volume. Like many of the floating objects in space, much of this data is abandoned, forgotten, and dangerous. Sensitive data lurking in unstructured systems can wreak havoc enterprises when left unmanaged. To deal with this problem, enterprises must extend their identity governance programs to data stored in files before hackers find and exploit it. Thankfully, the tools and the processes are the same well-known practices already used by identity professionals today. Taking cues from the global initiative to address the problem of space debris, find out how to extend your identity governance program into the new frontier of data.

    Join this live webinar to:

    • Understand the risk posed by sensitive data in files that often goes undetected and ignored, just like space debris.
    • Learn how to identify and triage sensitive data in files, diagnosing the risk posed to your organization.
    • Discover how to develop a clear roadmap that can help mitigate the risk posed by sensitive data.

    Can't make the webinar? Register anyway, and we'll send you the recording to view on-demand.
  • The Power of Choice- Identity Governance for Your Modern Enterprise
    The Power of Choice- Identity Governance for Your Modern Enterprise
    Kevin Cunningham, Chief Strategy Officer & Co-Founder SailPoint Mike Siegel, VP Business Development SailPoint Recorded: Jul 18 2018 29 mins
    Today’s modern enterprise is experiencing rapid change as digital transformation initiatives drive adoption of cloud-first strategies, reduction of infrastructure and capital expenditures, and new solutions to overcome the lack of skilled staff. To help ensure a secure and compliant environment, organizations are looking to harness the power of an identity platform to empower users and govern their access to all applications and data across their hybrid IT environment. Finding the best identity solution includes having the freedom to choose from a deployment option that best aligns with your infrastructure strategy; including SaaS, public cloud, data center, or from a trusted managed service provider.
  • GDPR: The Importance of Identity
    GDPR: The Importance of Identity
    Jeremy Grant Managing Director Kelly DeMarchis Bastide Partner Recorded: Jul 18 2018 60 mins
    A central part of GDPR focuses on protecting personal data – and respecting consumers’ choices on how that data is used. To follow through on this goal, it’s essential that organizations implement the necessary visibility and controls to govern the access of both standard and privileged users to ensure that only the right people in the right circumstances can access personal Jeremy Grant, who previously led the National Strategy for Trusted Identities in Cyberspace and served as Senior Executive Advisor for Identity Management at NIST, explores how:
    Siloed and inadequate identity and privilege controls constitute the number one vector of attack for adversaries to gain unwanted access to personal information
    Identity management, when executed correctly, can be “the great enabler” – helping not only with GDPR compliance, but providing a foundation for a stronger security posture, greater efficiencies and overall better experiences for your employees, privileged users and customers alike.
  • How GE Built a Scaleable Identity Governance Program
    How GE Built a Scaleable Identity Governance Program
    Paul Trulove, CPO SailPoint Matt Powell Sr. Application Engineer GE Tiffany Samuel Sr. Tech Product Manager GE Recorded: Jul 18 2018 49 mins
    In support of their ongoing digital transformation, the Identity & Access Management team at GE has been on a journey from a complex decentralized model of 9 independent identity teams and platforms to a simplified and centralized ‘OneIdM’ service offering powered by SailPoint IdentityIQ.
  • Identity is Security
    Identity is Security
    Juliette Rizkallah, CMO SailPoint Recorded: Jul 17 2018 36 mins
    Times are changing: data breaches are more frequent and damaging, and the regulations (like GDPR) that help combat them carry both great requirements and consequences. Your organization’s security just isn’t complete without identity governance. With breaches frequently targeting enterprise users instead of their network and endpoints, it’s more important than ever for IT leaders to recognize that identity is security.
  • Power-up your Access Management with Identity Governance
    Power-up your Access Management with Identity Governance
    Mike Kiser, Senior Security Strategist David Lee, Identity Strategist, Office of the CTO Recorded: Jul 17 2018 29 mins
    Today’s organizations are utilizing the benefits of access management to balance ease of access to a variety of cloud and on-premises applications from anywhere, on any device. While this enables users with 24/7 access, it also creates a large attack surface that is prime to be compromised. With 77% of data breaches involving an insider, it has become necessary to ensure access to all corporate resources is secured and governed.

    By leveraging the power of identity governance with access management, you can now institute an identity-aware solution that securely and effectively authenticates, provisions and governs access to all applications and data across the enterprise ensuring adherence to corporate policies and security requirements.
  • Using Identity to Mitigate the Risk of Insider Threats
    Using Identity to Mitigate the Risk of Insider Threats
    Paul Trulove, Sr. Vice President Larry Salazar, Vertical Markets Manager Recorded: Jul 17 2018 42 mins
    Insiders were instrumental in numerous healthcare data breaches in 2016 and 2017. It will not likely change in 2018.

    How do you counter this threat? Relying exclusively on employee awareness is insufficient without adequate technology. Identity management closes this security gap.

    In this webinar, you will come away with the following key takeaways:

    Understand who the insiders are and what motivations lead to data breaches

    Learn how insiders create security gaps in their regular workflow and why these gaps are especially difficult to address

    Discover how coupling identity management of systems, applications and data files, with behavior monitoring and analysis can counter the insider threats

Embed in website or blog