ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:SailPoint Technologies

  • Enabling & Securing Digital Identities

    SailPoint Identity governance enables and secures todays digital identities. Their open identity platform helps organizations manage the link between users and applications during their digital transformation. View this video to learn more.

  • Predictive Identity: A Key Enabler for a Successful Merger or Acquisition

    This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.

  • Peer Insights: Identity Governance and Administration

    This Gartner Peer Insights report focuses on the Identity Governance and Administration (IGA) market, observing which vendors/offerings tend to be well-received by their users. After extensive evaluation, Gartner awards up to 7 vendors with the Customers’ Choice distinction. Download this report to discover who received this year’s honors.

  • Identity Governance & Administration (IGA)

    In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.

  • SailPoint Predictive Identity

    AI and machine learning capabilities enable unmatched efficiency and automation across cybersecurity tools and tactics. Download this report for an in-depth look at Predictive Identity, SailPoint’s identity governance SaaS platform that harnesses the power of AI to assess risk and offer recommendations.

  • Protecting Intellectual Property with Data Access Governance

    In order to protect your organization’s sensitive intellectual property (IP), it’s paramount to know who has access to it, and what those users are doing with that access. Download this solution brief for more on protecting your IP and discover how SailPoint’s identity governance and data access management offerings may be able to help.

  • The Future of Security and Compliance Starts Here

    The same capabilities that enable improvements during a digital transformation can also lead to significant risk, if not properly addressed. In this solution overview, take a closer look at SailPoint Predictive Identity, which leverages the power of AI and machine learning to simplify IAM and enable you with advanced governance capabilities.

  • Intelligent Cloud Identity Platform

    To address the cybersecurity challenges that result from a undergoing a digital transformation, organizations are implementing intelligent identity and access management practices. This solution brief provides an in-depth look at the key features and capabilities of SailPoint’s IdentityIQ platform, read on to see the benefits.

  • SailPoint Predictive Identity™: AI-driven Identity for Today’s Modern Enterprise

    The benefits of a digital transformation can create access complications, which can often lead to potential security risks. In this technology brief, discover how SailPoint harnesses the power of AI and machine learning in their Predictive Identity platform to help organizations ensure security, compliance and access management.

  • SailPoint Identity is Security

    If you can’t see who has access, know what your users are doing, automatically modify or terminate access, or flag suspicious activity, your organization’s security had identity-shaped holes it. In this short video, learn how to secure your organization SailPoint Identity.

  • SailPoint Identity Now: Certification Creation

    Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.

  • SailPoint Identity Hub: Search, Track & Manage Access

    The most difficult aspect of an organization’s identity governance strategy is understanding where their vulnerabilities lie and how to focus their tactics on addressing them. This short informational video provides a demo of SailPoint’s Identity Now hub – which allows organizations to search, track and manage access.

  • Identity Governance for Workday

    In this short video, discover how SailPoint can help organizations integrate identity governance into their cloud-based HR solutions, like Workday, enabling them the ability to eliminate time-consuming, manual tasks related to access provisioning and ensure each user has appropriate access to the right data and apps.

  • SailPoint Identity Now: Certification Process Overview

    In this latest installment of SailPoint’s short, informational videos highlighting the various capabilities of their Identity Now hub – take a closer look at how the platform improves upon traditional employee access review and certification processes. Watch now for the 3-minute demo.

  • SailPoint Identity Now: Dashboard Overview

    In this brief, 2-minute informational video, enjoy an overview of SailPoint’s Identity Now dashboard, an identity and access management hub designed to enable quick and easy access controls of for employees. Watch now for a quick look at the key features and how it works.

  • IdentityNow Dashboard Demo

    Tune into this video for a demonstration of IdentityNow to see how users can easily track their identity data and tasks on a single screen.

  • Securing Your Data Stored in OneDrive: SailPoint Demo

    In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.

  • Role-based identity management: SailPoint short video

    In this short video, learn how you can easily manage roles at your organization with IdentityNow’s role-based identity management function.

  • IdentityNow Short Video: Separation of Duties

    Separation of Duties (SOD) is an internal control mechanism designed to prevent error and fraud by ensuring at least two individuals are responsible for separate parts of any high risk or sensitive tasks. SOD policies for identity systems, however, can be difficult and complex to manage. Find out how IdentityNow makes it easier.

  • Identity Data Reporting

    View this to see how IdentityNow makes it easy to query all your identity data and quickly produce customized reports on any type of identity information you may need for a compliance audit.

  • Password Management

    Learn how SailPoint makes it easy for users to manage their passwords, while still complying with organizational security policies.

  • Sailpoint Final

    When a company has over 10,000 employees, over 100 applications, and different privileges within those applications, there’s a lot to protect. That’s why SailPoint simplifies identity management for enterprises with automation. View this short video to learn more.

  • Identity Governance for File Shares

    Learn how IdentityIQ File Access Manager can help you securely manage access to your sensitive data and files in the cloud and on-premises.

  • Magic Quadrant for Identity Governance and Administration

    Like most security tools, identity governance and administration (IGA) is under pressure to provide cloud-based services to meet customer need. In this Magic Quadrant report, Gartner evaluates key IGA offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.

  • Finds Cost- and Time-Savings with IdentityNow

    Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.