SailPoint Set To Offer a No-Code Way To Automate Security Tasks, Customize...
SailPoint is putting final touches on a no-code way to customize and secure app workflows. The SailPoint Workflows visual SaaS tool aims to empower enterprises to automate security tasks without...
View ArticleLegacy to Modern: Replacing Legacy Identity at PG&E
Pacific Gas and Electric Company (PG&E) is one of the largest combined natural gas and electric energy companies in the United States.?With over 50 thousand employees and contractors operating in...
View ArticleOkta: Build a Secure SPA with React Routing
When building an SPA (single page application) with React, routing is one of the fundamental processes a developer must handle. React routing is the process of building routes, determining the content...
View ArticleIAM vs PAM: What Are the Differences?
Identity and Access Management (IAM) and Privileged Access Management (PAM) are two types of access management systems that are commonly used to manage identity authentication and authorization across...
View ArticleWebinar – The Top 10 Actions Every Organization Should Take to Protect their...
Date: Tuesday, November 16th at 11am PT / 2pm ET You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory,...
View ArticleSailpoint IdentityIQ – Delete Identity using Console
Sailpoint IdentityIQ allows you to delete any identity within the system. You can do it thru the console or UI. On this post we will show you how to perform a delete for a single user using the...
View ArticleSailpoint IdentityIQ – Configure Identity Warehouse UI
Another task necessary during your IdentityIQ implementation is the configuration of identity attributes. Following the steps required. Like we saw in previous post, after creating or importing a new...
View ArticleWomen in Identity Security: Sylvia Sykula
At SailPoint, our crew members show us every day that anything is possible. Sylvia Sykula, eLearning Developer, solidifies this truth even more. In this Women in Identity Security blog, we ask Sylvia...
View ArticleForgerock Webinar- What to Look for in Your Identity Cloud Provider
Forgerock Webinar- What to Look for in Your Identity Cloud Provider Identity cloud providers may seem to offer similar services, but they are not the same. And in today’s environment of escalating...
View Article3 Ways to Streamline Auth, Access & Security for Oracle EBS
Oracle E-Business Suite (EBS) is a popular ERP tool for business and financial operations that uses a combination of usernames and passwords to authenticate users. This form of authentication has known...
View Article