Sailpoint’s latest quarterly report, as filed with the SEC was released in November 2019. Let’s take a look inside. As per the Business Overview section of the 10Q for those who don’t know: “SailPoint is the leading provider of enterprise identity governance solutions. Our open identity platform provides organizations with critical visibility into who currently has access […]
As the first half of 2019 has been and gone, I’ve taken a quick look at the funding rounds that have taken place so far this year, within the identity and access management space and attempted some coarse grained analysis. The focus is global and the sector definition is quite broad and based on the […]
Today’s authentication requirements go way beyond hooking into a database or directory and challenging every user and service for an Id and password. Authentication and the login experience, is the application entry point and can make or break your security posture and end user experience. Authentication is typically associated with identifying, to a certain degree of assurance, […]
A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a term coined by analyst group Forrester back in 2010 and has gained popularity since Google started using the concept with their employee management […]
Welcome to a digital identity project in 2020! You’ll be expected to have a plan for post-quantum cryptography. Your network will be littered with “zero trust” buzz words, that will make you suspect everyone, everything and every transaction. Add to that, “machines” will be learning everything, from how you like your coffee, through to every […]
2016 is drawing to an end, the goose is getting fat, the lights and decorations are adorning many a fire place and other such cold weather cliches. However, the attention must turn back to identity management and what the future may or may not hold. Digital identity or consumer based identity and access management (CIAM) […]
It’s that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin. This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on: Customer Identity Management The start of IoT security awareness Reduced Passwords on […]
January can’t go by without another set of prediction blogs coming our way. Be that for lifestyle, how to lose weight, how to gain weight, how to change our lives and so on. I thought I would join the band wagon and jot down what I think will be the top 5 challenges facing organisations […]
The ‘insider’ is the dude in the office. He (or she) probably works in IT and looks and acts like a regular employee. They are however, probably a bigger risk to the organisations corporate information than a hacker on the public internet. An insider is generally seen as a trusted user of the network. They […]