Story image

SailPoint updates IdentityIQ to expand definition of digital identities

24 Aug 18

Identity governance company SailPoint has announced updates with IdentityIQ to help organisations embrace developments in identity governance, which address the explosion of new users, applications and data-driven by digital transformation.

With IdentityIQ 7.3, SailPoint expands the definition of identities beyond humans, providing the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.

With the new IdentityIQ Accelerator Pack, SailPoint enables organisations to rapidly onboard the thousands of applications their business users now rely on into IdentityIQ, significantly accelerating their identity governance deployment and time-to-value.

IdentityIQ 7.3 also deepens the functionality for governing access to mission-critical Amazon Web Services (AWS) and SAP environments, ensuring they are secured in the same way as the rest of an organisation’s infrastructure.

Enterprises are increasingly relying on software bots and other types of non-human identities to drive business efficiencies and to keep pace with digital transformation.

Until now, these bots have largely been left unmanaged by identity governance programs, leaving organisations exposed to security and compliance risks. 

Now, IdentityIQ enables organisations to govern bots and their access to all enterprise applications and data by enforcing processes like requesting, approving and certifying access as well as extending access-based policy definitions to these non-human users.

“We continue to see an increase in the usage of bots in our IT environment and it is important to be able to manage and govern them just as we manage and govern their human counterparts,” says Manulife security operations, enterprise technology and services director Sheri Munro.

“These technologies create operational efficiencies for us, but we must incorporate them into our identity governance strategy to ensure we remain secure and compliant.”

IdentityIQ’s new Accelerator Pack empowers enterprises to rapidly scale their implementation across the increasingly broad and hybrid application environment.

Through pre-configured options and best practice use cases, enterprises can now onboard new applications and configure governance processes in a matter of hours versus weeks.

The Accelerator Pack also allows business analysts to easily take on the technical tasks of an IdentityIQ deployment, decreasing the time and cost to deploy and reducing the need for highly technical identity governance resources.

Importantly, the Accelerator Pack provides “break-glass” functionality and allows organisations to take instant, targeted action in the event of a data breach, immediately terminating an identity and re-provisioning access once it has been determined a threat no longer exists.

Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.