• slide
  • slide
  • slide


SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint's open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint's customers are among the world's largest companies in a wide range of industries.


IdentityIQ is an open-identity platform that provides robust capabilities to eliminate cybersecurity vulnerabilities and can be scaled to meet current and future identity governance needs.

SecurityIQ enables organizations to quickly discover, classify and establish access controls to sensitive files stored on-premises and in the cloud—thus helping to mitigate risk of data leakage and breach.

IdentityNow - A true cloud-based identity solution that quickly establishes visibility and effectively manages user access to all systems and applications with a simple and intuitive user experience.


Blogs by SailPoint

From Start to Finish: How to Modernize Identity in State & Local Government and Education Sectors
September 16, 2019
Over the last few years, SailPoint noticed a shift in the State, Local Government and Education (SLED) marketplace’s approach to identity. SLED organizations across the U.S. are transforming their identity programs from antiquated legacy solutions, or often manual processes, to a solution that can manage the complexity of today’s IT environment...


State & Local Contracts

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)



Case Study

"With SailPoint, our IT team is empowered to focus on tackling broader IT strategies and delivering on actionable goals. SailPoint IdentityNow is a critical security solution for us. - Perley Dexter, Director of IT Systems, Norwich University"


In today’s complex enterprise environments, understanding how technology can enable the successful management of risk is essential. One relatively recent and highly successful framework is the NIST Cybersecurity Framework (“Framework” or “CSF”). The CSF covers a wide range of capabilitie...

Preventing a data breach has always been an uphill climb. But is the hill getting steeper? With an increasing volume of health data breaches, rising costs and an ever-widening skills/personnel gap in cybersecurity, cloud-based identity levels the playing field.


Security Information and Event Management (SIEM) technologies provide real-time analysis of security alerts generated by network hardware and applications. Oftentimes this is done through the 'scraping' of end-system log files, which are then filtered, analyzed, and prepared for easy consumption ...

Product Brief

Product Brief
A Complete and Open Identity Governance Solution

Product Brief
Extend Identity Governance to Data Stored in Files.

The complexity of securing access to IT resources, together with a constantly changing and growing workforce is putting an everincreasing strain on IT operations. At the same time, business users can’t be burdened by inefficient workflows that impede their productivity. The only way to alleviate t...


Digital transformation has opened up opportunities for greater agility and growth in today’s modern enterprises. But it’s also introducing challenges. Digital transformation means more users, more apps, and more data – and if not properly addressed, also means more risk.

SailPoint’s AI-enabled cloud identity platform deliver all the critical capabilities that enable public agencies to secure all applications and data in several critical ways.

Solutions Brief

Gartner estimates 80% of all data in the world is stored in files, and oftentimes, these files are stored in insecure locations. Furthermore, many state and local governments and agencies have no visibility into where these files reside, what each file contains and who can access this data.