InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Strengthening cloud security posture: How CIEM minimizes overprivileged access and managing cloud entitlements

Presented by

Cameron Wilson - Product Marketing Manager, SailPoint; Colin Lyth - Lead Product Manager, SailPoint

About this talk

Infrastructure-as-a-service (IaaS) is engrained in every organization’s ecosystem, yet most organizations don’t have a clear understanding of who or what is accessing their cloud resources. This lack of visibility into cloud entitlements creates governance and organization challenges for IAM teams. Leaving your cloud infrastructure unprotected is leaving your organization unprotected. Join us to learn how SailPoint Cloud Infrastructure Entitlement Management (CIEM) solves this problem by bringing cloud entitlements information into SailPoint Identity Security Cloud. See how Identity Security Cloud capabilities enable governance of cloud complexity with CIEM data and learn how to truly fortify your security posture.
SailPoint

SailPoint

17165 subscribers126 talks
The core of enterprise security
SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.
Related topics