sb-as logo
Story image

SailPoint updates IdentityIQ to expand definition of digital identities

24 Aug 2018

Identity governance company SailPoint has announced updates with IdentityIQ to help organisations embrace developments in identity governance, which address the explosion of new users, applications and data-driven by digital transformation.

With IdentityIQ 7.3, SailPoint expands the definition of identities beyond humans, providing the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.

With the new IdentityIQ Accelerator Pack, SailPoint enables organisations to rapidly onboard the thousands of applications their business users now rely on into IdentityIQ, significantly accelerating their identity governance deployment and time-to-value.

IdentityIQ 7.3 also deepens the functionality for governing access to mission-critical Amazon Web Services (AWS) and SAP environments, ensuring they are secured in the same way as the rest of an organisation’s infrastructure.

Enterprises are increasingly relying on software bots and other types of non-human identities to drive business efficiencies and to keep pace with digital transformation.

Until now, these bots have largely been left unmanaged by identity governance programs, leaving organisations exposed to security and compliance risks. 

Now, IdentityIQ enables organisations to govern bots and their access to all enterprise applications and data by enforcing processes like requesting, approving and certifying access as well as extending access-based policy definitions to these non-human users.

“We continue to see an increase in the usage of bots in our IT environment and it is important to be able to manage and govern them just as we manage and govern their human counterparts,” says Manulife security operations, enterprise technology and services director Sheri Munro.

“These technologies create operational efficiencies for us, but we must incorporate them into our identity governance strategy to ensure we remain secure and compliant.”

IdentityIQ’s new Accelerator Pack empowers enterprises to rapidly scale their implementation across the increasingly broad and hybrid application environment.

Through pre-configured options and best practice use cases, enterprises can now onboard new applications and configure governance processes in a matter of hours versus weeks.

The Accelerator Pack also allows business analysts to easily take on the technical tasks of an IdentityIQ deployment, decreasing the time and cost to deploy and reducing the need for highly technical identity governance resources.

Importantly, the Accelerator Pack provides “break-glass” functionality and allows organisations to take instant, targeted action in the event of a data breach, immediately terminating an identity and re-provisioning access once it has been determined a threat no longer exists.

Story image
LogRhythm named #1 for customer satisfaction in G2 report
Named a Leader in G2 Research's reports for SIEM, Incident Response, and usability based on aggregated user rating data.More
Story image
Phishing becoming more prolific and impregnable - report
The study, conducted with VirusTotal and WHOIS XML, analysed more than 600,000 domains to accurately track malicious activity throughout the pandemic. More
Story image
Businesses move to cloud-based security solutions in a bid to support remote working
Cloud-based security tools are becoming increasingly popular following the rise in remote working during COVID-19, including a marked increase in businesses using such tools to protect of corporate financial information.More
Story image
Fortinet resolves to help communities through new Corporate Foundation
“Through the establishment of a Corporate Foundation, we are extending investments in security training and education, employee community engagement and disaster relief efforts to empower and protect our communities, as well as positively impact our business, employees, customers and shareholders.”More
Story image
Trend Micro ranks number one in Global Hybrid Cloud Security - IDC 
The cloud security firm enjoyed a market share of 29.5% last year, three times that of the number two vendor.More
Story image
Cyber attacks use LinkedIn to target companies and employees
The attacks, which ESET researchers have called Operation In(ter)ception, took place from September to December 2019 and are notable for using LinkedIn-based spearphishing. More