"With SailPoint, our IT team is empowered to focus on tackling broader IT strategies and delivering on actionable goals. SailPoint IdentityNow is a critical security solution for us. - Perley Dexter, Director of IT Systems, Norwich University"
In today’s complex enterprise environments, understanding how technology can enable the successful management
of risk is essential. One relatively recent and highly successful framework is the NIST Cybersecurity Framework (“Framework” or “CSF”).
The CSF covers a wide range of capabilities in recog...
Preventing a data breach has always been an uphill climb. But
is the hill getting steeper? With an increasing volume of health
data breaches, rising costs and an ever-widening
skills/personnel gap in cybersecurity, cloud-based
identity levels the playing field.
The impact of cybersecurity breaches is staggering – for example, in the 2016 Office of Management and Budget, Federal Information Security Act, Annual Report to Congress, federal agencies reported 30,899 information-security incidents, 16 of which met the threshold of being a major incident. With b...
In late January 2020, the US National Security Agency (NSA) released guidance for Mitigating Cloud Vulnerabilities. The document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass ma...
Cybersecurity threats now come in many different forms, from insiders,
ransomware and malware to phishing – the list of ways into an organization’s
sensitive underbelly is growing. What this shows us is the perimeter as we know it
is dead – the identity is the new attack vector.
Competing priorities coupled with limited resources create a
conundrum for higher education IT – that is where do you put your
finite dollars when it comes identity management? Often, institutions
must juggle with whether to prioritize between single sign on (SSO),
multifactor authentication (MF...
In this eBook, we’ll share three scenarios where government at the state and local levels can put identity and access management (IAM) to work today, bringing agencies closer to digital transformation while shoring up identity security around the applications and files that users have access to.
Security Information and Event Management (SIEM) technologies provide real-time analysis of
security alerts generated by network hardware and applications. Oftentimes this is done through
the 'scraping' of end-system log files, which are then filtered, analyzed, and prepared for easy