SailPoint drives next generation of cloud identity governance

Tech Intelligence Bulletin (HG Insights) – With the latest release of IdentityNow and version 8.0 of IdentityIQ, SailPoint customers now have access to the next generation of cloud identity governance, SailPoint Predictive Identity.

As a result, identity teams of all sizes can now embrace an AI-driven approach to identity governance that is adaptive, autonomous and predictive.

“Our business is moving and evolving quickly and our identity program needs to keep pace,” said Dan Malloy, Senior IT Architect at Abbott. “We’re eager to take our program to the next level, exploring the impact that AI and machine learning can have. For example, leveraging AI-based recommendations in access reviews and approvals will streamline and reduce the burden of compliance and audit requirements. With SailPoint, we are confident that our identity program will remain both nimble and comprehensive.”

AI-driven approach

“Identity governance is at the core of securing the digital foundation of today’s enterprise, yet the sheer amount of identity data that an organization houses today has skyrocketed, leaving identity teams stuck in an endless cycle of reacting,” said Paul Trulove, Chief Product Officer, SailPoint. “With SailPoint Predictive Identity, identity teams can finally get ahead, prioritizing areas of high-risk and efficiently automating lower risk identity decisions, while adapting and automating security or compliance policies along the way. This AI-driven approach to identity is the next generation of identity governance.”

Laser-focused cloud identity governance

With the latest release of IdentityNow and IdentityIQ 8.0, SailPoint continues to be laser-focused on helping organizations of all sizes to govern smart with SailPoint Predictive Identity by:

  • Delivering a recommendations-based approach to identity that speeds identity decisions, evolving identity programs to be more dynamic, adaptive and predictive
  • Ensuring that all users and their access is appropriate for their role and current access needs, with enhanced capabilities that automatically shut-down lingering access that could result in unnecessary risk; and by extending governance of data stored in files to include sensitive data that is embedded in image files
  • Simplifying and streamlining access policies. For example, creating separation-of-duties (SoD) policies now takes a matter of minutes versus weeks, dramatically improving operational efficiency and security.