sb-nz logo
Story image

Gartner names SailPoint Leader in identity governance for the sixth time

16 Oct 2019

Identity governance solutions provider SailPoint announced it has once again been named a Leader in Gartner’s Magic Quadrant for Identity Governance and Administration.

After conducting a company and product evaluation of SailPoint’s identity platform, SailPoint was recognised by Gartner as a Leader, positioned furthest for completeness of vision and highest for ability to execute for IGA.

“Organisations today look nothing like they did even just a couple of years ago. Users now encompass both human and non-human users; applications, data and infrastructure are no longer purely on-premise but largely live in the cloud today. These changes have been driven by the massive digital transformation underway, ” says SailPoint chief product officer Paul Trulove.

“For much the same reason, identity governance today does not look like it once did.”

“Our customers come to us because we stay in lock step with their needs, working to develop solutions that solve real business problems,” Trulove says.

“For example, we heard our customers asking for better ways to govern access to sensitive data held in files and folders and delivered File Access Manager to help them do that in the context of their identity programme.

“When the need for a more intelligent and autonomous identity programme emerged to tackle the growing complexity of hybrid IT environments, we delivered a new approach to identity with SailPoint Predictive Identity.

SailPoint’s Identity Platform aims to enable organisations of all sizes to drive a comprehensive approach to identity, one that governs all users, applications and data; governs deep across both cloud and on-premises infrastructures and governs smart, creating an AI-driven approach to identity governance.

The company has been positioned as a Leader in every Gartner Magic Quadrant for Identity Governance and Administration that has been published.

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Story image
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”More
Story image
Four tips for organisations to help future-proof their OT security strategy
IT and OT networks are founded on different and often conflicting priorities, making IT-OT security challenging for businesses. Only when the needs of both environments are thoroughly understood can digital convergence be successful.More
Story image
Report: Tech industry most attacked sector
"The current global crisis has shown us that cyber criminals will always take advantage of any situation and organisations must be ready for anything."More
Story image
How DDoS protection is like a car’s airbags
Just as someone would never remove the airbags from their car simply because they have never had a serious accident, so they should not cut back on cyber defences just because they hadn’t had a major attack in a while.More
Link image
Revealed: The A-Z of mobile workforce security
Ordinary office workers - now home office workers - have never been more at risk of cyber threats. Join this webcast series to hear from experts on how to best protect your business and your staff.More
Story image
NVIDIA announces new Mellanox SmartNIC for the modern data center
NVIDIA says the new SmartNIC draws on software-defined, hardware-accelerated engines to alleviate the bulk of network and security processing power typically applied to CPUs.More