sb-as logo
Story image

SailPoint outlines the three frontiers of identity governance at Navigate '18

16 May 2018

​SailPoint says the future of identity governance lies across three frontiers: users, applications, and data. Those three frontiers were the focus of the company’s sold-out Navigate ’18, which kicked off in Austin this week.

“Data breaches and compliance aren’t the only challenges we’re facing as an industry,” says SailPoint CEO and co-founder Mark McClain.

“The very nature of our business is changing. The pressure to digitise the enterprise is growing in importance as businesses fight to keep their competitive edge and to continuously deliver value to their customers.”

SailPoint believes that user and application populations are growing and changing. At the same time, data is moving and evolving into new formats and locations.

“Identity must evolve to tackle this new world in which we live, governing access across all users, all applications and all data. SailPoint is pushing the limits of these three new identity frontiers,” McClain says.

The user frontier: expanding identities beyond humans

Enterprise identity governance programs have traditionally focused on three primary users: employees, contractors and partners. In the new business world, non-human users – such as software bots and technology like RPA (Robotic Process Automation) – introduce a new identity type. Modern enterprises must rethink identities beyond humans, understanding how these non-human entities interact with enterprise applications and data while applying proper governance controls.

The application frontier: scaling to today’s realities 

Enterprises today manage hundreds of applications that drive their business forward. This includes an increasing number of SaaS applications alongside traditional legacy applications. As business users accelerate the need for new applications, identity governance must also evolve, making it easier to onboard new applications to more nimbly enable the business.

The data frontier: securing access to data in files

In the past, most sensitive data was stored in applications and databases such as CRM, HR, and financial systems. Today, end users are downloading, extracting and copying that data into files and then storing that data in file shares, like SharePoint, and cloud storage systems, such as Box and Google Drive, often leaving the data largely unprotected. This opens up a huge area of exposure for organisations that must be addressed with identity governance, making data the third, and perhaps most critical, new frontier in identity.

“As technology and innovation are changing the way we work, the nature of business users is evolving, while the volume of applications and data are furiously increasing,” McClain says.

“SailPoint is at the forefront of developing innovative ways of providing comprehensive identity governance to secure the digital identities of all users across all applications and all data. This is our vision and the only path forward for global enterprises today.”

Story image
Lumen upgrades DDoS mitigation service as attack volumes climb
In April and May 2020, the company observed 929,000 attacks - the highest number of attacks ever seen in a 31-day period.More
Story image
Video: 10 Minute IT Jams - SonicWall VP discusses the importance of endpoint security
In this video, Dmitriy discusses the exposure points and new risks that come as a result of widespread flexible working arrangements, how organisations should secure their massively distributed networks, and how SonicWall's Boundless Cybersecurity model can solve these issues.More
Story image
Women in cybersecurity – what is holding us back?
A robust and diverse workforce with wide-ranging skills and depth of experience is essential for providing balance, safety and continuity to both the industry and countries at large. More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Gigamon and Zscaler release cloud-first network detection for fluid workforces
“Our customers have significantly accelerated their digital transformation journeys during the pandemic, and this integration will help them better respond to threats.”More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More