InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Going beyond the glitz of graphs to enable identity visibility, security, and control

Presented by

Michael Presas, Product Manager, SailPoint

About this talk

As graph data structures and their visualizations persist, their growing application to identity and access management has created quite a splash. In fact, it's easy to get caught up in the hype, especially when presented with an appealing user experience. But the reality is that identity graphs are, in the end, tools used by real people looking for help with real problems; they're not automatic panaceas. The true value of a graph can be measured by the insights and context it provides. In other words, how it enables practitioners to answer the very critical question of ""so what?"" In this session, learn about how SailPoint's graph goes beyond a powerful and attractive user experience and enables unified visibility, helps identify risk, and ultimately progresses core business outcomes.
SailPoint

SailPoint

17266 subscribers134 talks
The core of enterprise security
SailPoint is a leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organizations across the globe to build a security foundation capable of defending against today’s most pressing threats.
Related topics