sb-as logo
Story image

SailPoint outlines the three frontiers of identity governance at Navigate '18

16 May 2018

​SailPoint says the future of identity governance lies across three frontiers: users, applications, and data. Those three frontiers were the focus of the company’s sold-out Navigate ’18, which kicked off in Austin this week.

“Data breaches and compliance aren’t the only challenges we’re facing as an industry,” says SailPoint CEO and co-founder Mark McClain.

“The very nature of our business is changing. The pressure to digitise the enterprise is growing in importance as businesses fight to keep their competitive edge and to continuously deliver value to their customers.”

SailPoint believes that user and application populations are growing and changing. At the same time, data is moving and evolving into new formats and locations.

“Identity must evolve to tackle this new world in which we live, governing access across all users, all applications and all data. SailPoint is pushing the limits of these three new identity frontiers,” McClain says.

The user frontier: expanding identities beyond humans

Enterprise identity governance programs have traditionally focused on three primary users: employees, contractors and partners. In the new business world, non-human users – such as software bots and technology like RPA (Robotic Process Automation) – introduce a new identity type. Modern enterprises must rethink identities beyond humans, understanding how these non-human entities interact with enterprise applications and data while applying proper governance controls.

The application frontier: scaling to today’s realities 

Enterprises today manage hundreds of applications that drive their business forward. This includes an increasing number of SaaS applications alongside traditional legacy applications. As business users accelerate the need for new applications, identity governance must also evolve, making it easier to onboard new applications to more nimbly enable the business.

The data frontier: securing access to data in files

In the past, most sensitive data was stored in applications and databases such as CRM, HR, and financial systems. Today, end users are downloading, extracting and copying that data into files and then storing that data in file shares, like SharePoint, and cloud storage systems, such as Box and Google Drive, often leaving the data largely unprotected. This opens up a huge area of exposure for organisations that must be addressed with identity governance, making data the third, and perhaps most critical, new frontier in identity.

“As technology and innovation are changing the way we work, the nature of business users is evolving, while the volume of applications and data are furiously increasing,” McClain says.

“SailPoint is at the forefront of developing innovative ways of providing comprehensive identity governance to secure the digital identities of all users across all applications and all data. This is our vision and the only path forward for global enterprises today.”

Story image
Trend Micro adds cloud-native container security to Cloud One Services Platform
Designed to ease the security of container builds, deployments and runtime workflows, the new service helps developers accelerate innovation and minimise application downtime across Kubernetes environments.More
Story image
Red Hat to acquire Kubernetes-native security provider StackRox
Red Hat will further expand its security offering, adding StackRox's complementary capabilities to strengthen integrated security across its open hybrid cloud portfolio.More
Story image
Fortinet promises free cybersecurity training until skills gap trend reverses
"We are committed to continue offering the entire catalogue of self-paced Network Security Expert training at no cost until we see the skills gap trend reverse."More
Story image
Hackers in your bedroom: Hackers targeting smart sex toys
A group of researchers reported vulnerabilities in an internet-enabled male chastity cage. More
Story image
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More