sb-nz logo
Story image

SailPoint improves security and compliance with SaaS update

18 Oct 2018

Enterprise identity governance solutions provider SailPoint has unveiled a series of new features in IdentityNow, its SaaS identity governance platform.

Enhancements have been made towards both closing security and compliance gaps and simplifying identity implementations for organisations who may not have dedicated identity teams and resources. New in IdentityNow is the Dynamic Discovery Engine, an innovation that allows users to easily and quickly create policies, access reviews, dashboards and reporting.

As a result, IdentityNow customers are better able to address the mounting security and compliance challenges that all enterprises face today.

“When we started our identity governance journey, a key requirement for us was the ability to automate identity processes where we could, while improving our audit and compliance track record,” said FTD information risk management senior director Michael Boucher. 

“With SailPoint IdentityNow, we achieved important quick wins on the audit front, and now have a comprehensive identity program in place that drives stronger risk management while enabling our users with the access they need to do their jobs. We were able to accomplish this with only one dedicated person on staff.”

The new Dynamic Discovery Engine powers the following features in IdentityNow:

  • Streamlined separation-of-duty (SoD) policy management that simplifies and speeds the process of investigating access, uncovering any access-related conflicts of interest and creating automated policies that ensure compliance.  
  • Dynamic access reviews that slice through identity data to instantly review and remediate access discrepancies, discovering application and entitlement owners in seconds and then applying a targeted certification campaign to meet compliance and audit requirements.  
  • Personalised dashboards that provide each user a 360-degree view of all their identity-related tasks, including an intuitive view into access certifications or approval requests that need to be completed.  
  • Sophisticated audit reporting that easily surfaces details and produces reports on who has access to what, when access was granted, and if policies have been violated. 

SailPoint chief product officer Paul Trulove says, “All companies today understand that they need solutions that proactively address security and compliance requirements, while providing visibility and control over their complex IT environments and the users who have access to them.

“Where many companies struggle with identity governance, especially for enterprises that have particularly stretched IT and security teams, is how to enable the business to grow while maintaining a strong security and compliance posture.”

Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
SOC, SIEM, SOAR and SASE define Fortinet’s Security Fabric
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, deciphers the jargon and explains how an alphabet soup of integrated security services spells comprehensive protection for your network and ensures business continuity.More
Story image
Criminals scale back DDoS attacks after 'abnormal' spike in Q2
The Q2 spike seems to have been short-lived as DDoS activity returns to ‘normal’ levels over Q3, with 73% fewer attacks than seen in the previous quarter.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Download image
NFV: The ticket to stronger, simpler corporate networks
It's a big industry - but what exactly is NFV?More