sb-as logo
Story image

SailPoint rolls out cloud governance solutions for a multi-cloud world

SailPoint has added new cloud governance solutions to the SailPoint Predictive Identity Platform for IaaS cloud platforms, resources and workloads.

Specifically, two new cloud governance services, SailPoint Cloud Access Management and SailPoint Workload Privilege Management, will be available as part of the SailPoint Predictive Identity platform.

Enterprises can now extend identity governance across cloud platforms and resources for users, including both regular and privileged users plus the non-human users whose access is prevalent in these environments, SailPoint states.

Similar to other SailPoint Predictive Identity services, these new cloud governance services automate, anticipate and streamline identity governance decisions through the use of Artificial Intelligence (AI) and Machine Learning (ML) technologies.

SailPoint Cloud Access Management enables enterprises to gain better visibility into which users, human and non-human, have access to multi-cloud IaaS environments, leveraging real-time monitoring to automatically find and manage high-risk access, and ensuring least privilege using defined guardrails where necessary.

SailPoint Workload Privilege Management, on the other hand, dynamically protects privileged access to workloads running on cloud infrastructure.

This includes automating the creation and rotation of credentials, keys and passwords; and recording and logging activity whenever privileged tasks are performed for security and audit purposes.

As the adoption of multi-cloud platforms increases, without proper governance over access to these platforms and workloads, enterprises lack visibility into who and what has access to sensitive applications and data in the cloud which opens up new areas of risk across the organisation, SailPoint states.

SailPoint chief product officer Paul Trulove says, “The new services help to close security and compliance gaps that have been created as enterprises migrate workloads to the cloud or launch new cloud-native workloads.”

Trulove says, “By extending identity governance to evaluate where access risks may exist in these environments, we’re providing the visibility our customers need to understand and secure access while speeding important access decisions in the cloud.

“These decisions include discovering proper versus suspicious user access; locking down privileged user access where needed; and delivering automated access that conforms to corporate policy.

“The SailPoint Predictive IdentityTM platform gives customers the intelligent, immediate oversight into user access across today’s multi-cloud enterprise without slowing the velocity of the business.”

These new cloud governance services follows the recently introduced SailPoint Access Modeling service. Other SailPoint Predictive Identity services include SailPoint Access Insights and the SailPoint Recommendations Engine. The SailPoint Predictive Identity platform now provides a comprehensive, AI and ML-enabled identity platform to the market.

Story image
Cyber threats, rising costs, cloud integration - Dell reveals data trends
Results from Dell's Global Data Protection Index indicate the advances in data technologies, while potentially lucrative, also present significant issues for organisations.More
Story image
Eliminating gender bias in cybersecurity could grow industry by the billions
if gender bias were eliminated from the cybersecurity industries of the US and UK, a total of $43.1 billion and £17 billion would be added to their respective economies, according to data from Tessian.More
Story image
Internet infrastructure strained as demand for servers surges 30%
Internet service providers are extending data caps to meet the newfound reliance on the network, however, some experts express uncertainty concerning internet infrastructure’s ability to keep up with the rapidly growing demand.More
Story image
Interview: LogRhythm's Simon Howe on AI and cybersecurity
The vice president of APAC sales for LogRhythm talks to Techday about user and entity behaviour analytics, and how AI and ML can revolutionise responses to cyber threats.More
Story image
'We are in a permanent state of cyber warfare' say 88% of IT pros
“Powerful attack methods, like establishing backdoors with machine identities, are now available as commodity malware, making it harder for security professionals to defend against these attacks.”More
Story image
Zero trust security gaining momentum as a cybersecurity model
The model is centred on the belief that organisations should not automatically trust anything inside or outside its perimeters and instead must verify anything trying to connect to its systems before granting access, according to CSO.More