• slide
  • slide
  • slide


Identity & Access Management Solutions for Government

SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting government agencies from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of organizations\s worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their organization, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.


  • IdentityIQ

    IdentityIQ is an open-identity platform that provides robust capabilities to eliminate cybersecurity vulnerabilities and can be scaled to meet current and future identity governance needs.

  • SecurityIQ

    SecurityIQ enables organizations to quickly discover, classify and establish access controls to sensitive files stored on-premises and in the cloud—thus helping to mitigate risk of data leakage and breach.

  • IdentityNow

    IdentityNow is a true cloud-based identity solution that quickly establishes visibility and effectively manages user access to all systems and applications with a simple and intuitive user experience.


Blogs by SailPoint

State Governments Rely on SailPoint to Address Top Priorities
January 14, 2021
NASCIO recently released their top priorities for 2021. The NASCIO list is formed by a survey of its membership, whom it asks to prioritize the top issues they face. This year’s results we noticed a few shifts in the top priorities but many that stayed the same from the previous year. Read More

Balancing Zero Trust with a Strong Identity Strategy and AI
December 17, 2019
The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Read More

From Start to Finish: How to Modernize Identity in State & Local Government and Education Sectors
September 16, 2019
Over the last few years, SailPoint noticed a shift in the State, Local Government and Education (SLED) marketplace’s approach to identity. SLED organizations across the U.S. are transforming their identity programs from antiquated legacy solutions, or often manual processes, to a solution that can manage the complexity of today’s IT environment. Read More

The City of Boston Modernizes Identity Management
June 25, 2019
Essential to managing City of Boston’s employee access to the IT infrastructure, is their identity management program. Read More

Tech Spotlights

SailPoint logo


Tech Spotlight Series – SailPoint Access Certification

Ensuring that these privileges are removed when a contractor no longer requires them is key to maintaining a secure organization.


SailPoint logo


Tech Spotlight Series – SailPoint Contractor Onboarding


SailPoint logo

Tech Spotlight Series – SailPoint New Employee Access

Accelerate New Employee Access and Give Leadership Their Valuable Time Back




Mar 31, 2021- Mar 30, 2026

GSA Multiple Award Schedule (MAS)

Dec 20, 2011- Dec 19, 2026

GSA Multiple Award Schedule Contract (MAS)

Aug 22, 2018- Aug 21, 2023


May 01, 2015- Apr 30, 2025


Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available


Aug 22, 2018- Aug 21, 2023

State and Local


Aug 28, 2012- Dec 19, 2026

City of Seattle Contract

Jul 11, 2014- Dec 19, 2026

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

NASPO ValuePoint

Oct 14, 2016- Sep 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Apr 11, 2016- Nov 30, 2022

OH STS 0119Y

May 31, 2012- Dec 19, 2026

Oklahoma DIR Contract # SW1056A

Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available

State of Indiana Contract

Aug 01, 2017- Jun 30, 2022

State of New Mexico Contract

Aug 01, 2017- Dec 31, 2022

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available


E&I Carahsoft Cloud Solutions & Services Distributor Contract

Apr 01, 2021- Mar 31, 2026

Educational Software Solutions and Services - OMNIA Partners, Public Sector

Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

Illinois Learning Technology Purchase Program (ILTPP)

May 20, 2019- Mar 01, 2023

Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


Oct 20, 2015- Sep 03, 2025

The Quilt

MSA - 05012019F
Apr 01, 2016- May 02, 2025


May 02, 2014- Dec 19, 2026


Past Events, Webinars & Trainings


Case Study

"With SailPoint, our IT team is empowered to focus on tackling broader IT strategies and delivering on actionable goals. SailPoint IdentityNow is a critical security solution for us. - Perley Dexter, Director of IT Systems, Norwich University"


In today’s complex enterprise environments, understanding how technology can enable the successful management of risk is essential. One relatively recent and highly successful framework is the NIST Cybersecurity Framework (“Framework” or “CSF”). The CSF covers a wide range of capabilities in recog...

SailPoint Technologies Datasheet
Preventing a data breach has always been an uphill climb. But is the hill getting steeper? With an increasing volume of health data breaches, rising costs and an ever-widening skills/personnel gap in cybersecurity, cloud-based identity levels the playing field.

SailPoint Technologies Datasheet

The impact of cybersecurity breaches is staggering – for example, in the 2016 Office of Management and Budget, Federal Information Security Act, Annual Report to Congress, federal agencies reported 30,899 information-security incidents, 16 of which met the threshold of being a major incident. With b...

In late January 2020, the US National Security Agency (NSA) released guidance for Mitigating Cloud Vulnerabilities. The document divides cloud vulnerabilities into four classes (misconfiguration, poor access control, shared tenancy vulnerabilities, and supply chain vulnerabilities) that encompass ma...


Cybersecurity threats now come in many different forms, from insiders, ransomware and malware to phishing – the list of ways into an organization’s sensitive underbelly is growing. What this shows us is the perimeter as we know it is dead – the identity is the new attack vector.

Competing priorities coupled with limited resources create a conundrum for higher education IT – that is where do you put your finite dollars when it comes identity management? Often, institutions must juggle with whether to prioritize between single sign on (SSO), multifactor authentication (MF...

In this eBook, we’ll share three scenarios where government at the state and local levels can put identity and access management (IAM) to work today, bringing agencies closer to digital transformation while shoring up identity security around the applications and files that users have access to.


Security Information and Event Management (SIEM) technologies provide real-time analysis of security alerts generated by network hardware and applications. Oftentimes this is done through the 'scraping' of end-system log files, which are then filtered, analyzed, and prepared for easy consumption ...