Story image

SailPoint improves security and compliance with SaaS update

18 Oct 18

Enterprise identity governance solutions provider SailPoint has unveiled a series of new features in IdentityNow, its SaaS identity governance platform.

Enhancements have been made towards both closing security and compliance gaps and simplifying identity implementations for organisations who may not have dedicated identity teams and resources. New in IdentityNow is the Dynamic Discovery Engine, an innovation that allows users to easily and quickly create policies, access reviews, dashboards and reporting.

As a result, IdentityNow customers are better able to address the mounting security and compliance challenges that all enterprises face today.

“When we started our identity governance journey, a key requirement for us was the ability to automate identity processes where we could, while improving our audit and compliance track record,” said FTD information risk management senior director Michael Boucher. 

“With SailPoint IdentityNow, we achieved important quick wins on the audit front, and now have a comprehensive identity program in place that drives stronger risk management while enabling our users with the access they need to do their jobs. We were able to accomplish this with only one dedicated person on staff.”

The new Dynamic Discovery Engine powers the following features in IdentityNow:

  • Streamlined separation-of-duty (SoD) policy management that simplifies and speeds the process of investigating access, uncovering any access-related conflicts of interest and creating automated policies that ensure compliance.
     
  • Dynamic access reviews that slice through identity data to instantly review and remediate access discrepancies, discovering application and entitlement owners in seconds and then applying a targeted certification campaign to meet compliance and audit requirements.
     
  • Personalised dashboards that provide each user a 360-degree view of all their identity-related tasks, including an intuitive view into access certifications or approval requests that need to be completed.
     
  • Sophisticated audit reporting that easily surfaces details and produces reports on who has access to what, when access was granted, and if policies have been violated. 

SailPoint chief product officer Paul Trulove says, “All companies today understand that they need solutions that proactively address security and compliance requirements, while providing visibility and control over their complex IT environments and the users who have access to them.

“Where many companies struggle with identity governance, especially for enterprises that have particularly stretched IT and security teams, is how to enable the business to grow while maintaining a strong security and compliance posture.”

IP theft: A global issue catching NZ businesses off guard
“We have this incredible record of innovation in New Zealand. But our innovative businesses haven’t always been meticulous in shoring up their IP."
Why A/NZ organisations need to improve compliance protocols
Only a mere 4% of IT decision makers and data managers surveyed said their organisation faced no data management challenges. 
What the people say - Gartner’s November Customers’ Choices
A roundup of the latest Gartner Peer Insight Customers’ Choices from Backup and Recovery to Business Intelligence and Analytics, and more.
BlackBerry buys out cybersecurity AI firm Cylance
“We are eager to leverage BlackBerry’s mobility and security strengths to adapt our advanced AI technology to deliver a single platform.”
Data protection is key to building customer trust
"New data compliance rules offer an opportunity for businesses to re-evaluate their processes and improve data management and customer loyalty."
NZ Internet Task Force joins iSANZ Hall of Fame
NZITF chair Barry Brailey and former chairs Mike Seddon and Paul McKitrick received the award in Auckland last week.
Quantum computing: The double-edged sword for cybersecurity
Quantum computing is quickly moving from science fiction to reality.
Three ways to achieve data security whilst enabling BYOD
"A mobility strategy is now more important than ever before, that said, selecting the right one is often no small task."