Sponsored Content by SailPoint

Making Strategic Bets to Address the Complexities of Next-Gen Identity Security

By Matt Mills, President, SailPoint

When SailPoint was founded nearly 20 years ago, the identity security space looked a lot different than it does today. That shouldn’t come as a surprise—identity security is hardly the only thing that has changed significantly over the past two decades. Still, it’s fascinating to consider how far identity security has come in such a short period of time, and how integral identities are to both the enablement and security of today’s enterprise. While identities play an increasingly important role in business enablement, the modern threat landscape is more dynamic than ever, and attackers are constantly identifying new ways to compromise and exploit vulnerable identities. It’s vital that both identity providers and their customers keep a keen eye on the future, anticipating the threats, trends, and challenges that next-gen identity security will need to address.

Investing in Innovation from the Beginning

There may be no market where strategic foresight has been more important than identity security. It’s amazing to look back and consider that SailPoint’s very first identity offering was a solution that allowed organizations to determine whether access was aligned with compliance requirements. Back in those days, most digital identities were user accounts, and provisioning their access needs within a given environment was something that could still be accomplished manually. Even then, it was clear that identity security needs would become more complex with time, and we quickly added the ability to provision and de-provision access in ways designed to not just boost compliance goals but improve productivity as well. At a time when the identity security market was still in its relative infancy, it was a bold move—but one that paid off. It underscored the importance of thinking ahead about what might come next.

The growth of identities saw the emergence of nonhuman identities, including servers, devices, cloud applications, and more. By now, they vastly outnumber human identities. Early investment in artificial intelligence (AI) capabilities was critical for identity providers as identities went from something that could be managed by a diligent employee with a spreadsheet to something far more expansive. Today’s enterprises often manage identities numbering in the hundreds of thousands, to multi-millions, far beyond what human beings can be expected to manage—and that doesn’t even begin to touch on application access, entitlements, or data. When you zoom out to see the full picture, you’re looking at upwards of billions of risk points. SailPoint’s early investments in AI and automation allowed us to keep our customers equipped with the tools necessary to manage both human and nonhuman identities, even amid that exponential growth. We first incorporated AI, machine learning, and deep analytics into our solutions all the way back in 2017, and that foresight helped blaze a new trail for the industry as a whole.

Embracing a More Unified Future

Transformative as they were when they first emerged, AI and automation are now table stakes. At SailPoint, when considering what the next generation of identity security will look like, a word that consistently arises is “Unified.” Today’s identity security market often appears fractured and disjointed. Why are employee entitlements managed separately from non-employee entitlements? Why are “access” and “privileged access” provisioned differently? Why are cloud-based accounts managed differently from software-as-a-service (SaaS) accounts? Today’s identity security space is filled with siloed solutions—and while many of them are no doubt effective, modern enterprises require a more autonomous, integrated, and unified approach.

This eye toward a more unified future has informed many of SailPoint’s strategic decisions over the past year. The growth of contract work and increasing popularity of SaaS vendors has made securing non-employee identities a major priority for today’s organizations, but too many still rely on specialized solutions. Our acquisition of SecZetta earlier this year was an important step toward changing that—by incorporating market-leading non-employee identity security capabilities into our existing identity security solutions, we are now able to offer organizations a more comprehensive way to visualize, provision, and secure their digital identities—whether they are employees, contract workers, vendors, or other third parties. As third-party breaches continue to make headlines across every industry, organizations are looking for a more straightforward way to manage their vendors and partners, and more are asking why employee and non-employee identities should be managed separately. The answer? They shouldn’t.

SailPoint’s unified approach to next-gen identity security also means breaking down the silos that are traditionally privileged access management (PAM) and uniting visibility regardless of how sensitive (or not) an identity’s access is. For over two decades, the concept of “privileged” access has been a very static and specialized discipline, with separate tools to see access needs for those with privileged or sensitive access vs. those with regular access. At SailPoint, we see PAM as an extension of existing identity management and control systems. Sorting through multiple, disparate systems to obtain visibility into both regular and sensitive access is neither efficient nor scalable in today’s environments. The need for a more holistic approach that addresses and manages risk across the entire spectrum of access needs is what drove SailPoint’s recent acquisition of Osirium. The ability to provide organizations with both visibility and real-time control over how their identities are interacting with data and applications is long overdue and we believe will help drive the identity security market forward in a more unified way. Bringing all of these capabilities under a single platform umbrella, a unified data model, will allow businesses to manage their identities in a more streamlined way, improving efficiency and driving better security and business outcomes.

Defining the Next Generation of Identity Security

No company can claim to have perfect knowledge of the future, but SailPoint has made strategic bets over the years— paying off handsomely towards accelerating our next generation vision.  We were early believers in the business potential of identity management and security, and we made significant investments in AI and automation long before the industry recognized how essential they would become. SailPoint has a track record of zigging when the rest of the industry zags—and while that has raised the occasional eyebrow, it has also allowed us to effectively anticipate the needs of our customers and continue to provide an industry-leading approach to identity security.

The next generation of identity security will be defined by its unified approach. It will ensure that enterprises have a trusted technology ecosystem, one that allows the business to flourish as quickly and seamlessly as possible. Next-gen identity security should ultimately equip every enterprise to effortlessly manage and secure their identities at any speed, at any scale. The outcome? Businesses that can compete fiercely, grow and evolve at any pace, and drive business acceleration that enables every identity to do their best work, securely, efficiently with peace of mind. This is how we define next-gen identity security at SailPoint.

SailPoint equips every enterprise to effortlessly manage and secure their identities – at any scale, at any speed. Learn more at SailPoint.com


This article is presented by TC Brand Studio. This is paid content, TechCrunch editorial was not involved in the development of this article. Reach out to learn more about partnering with TC Brand Studio.

More TechCrunch

CIOs trying to govern generative AI have the same concerns they had about cloud computing 15 years ago, but they’ve learned some things along the way.

CIOs’ concerns over generative AI echo those of the early days of cloud computing

It sounds like the latest dispute between Apple and Fortnite-maker Epic Games isn’t over. Epic has been fighting Apple for years over the company’s revenue-sharing requirements in the App Store.…

Epic Games CEO promises to ‘fight’ Apple over ‘absurd’ changes

As deep-pocketed companies like Amazon, Google and Walmart invest in and experiment with drone delivery, a phenomenon reflective of this modern era has emerged. Drones, carrying snacks and other sundries,…

What happens if you shoot down a delivery drone?

A police officer pulled over a self-driving Waymo vehicle in Phoenix after it ran a red light and pulled into a lane of oncoming traffic, according to dispatch records. The…

Waymo robotaxi pulled over by Phoenix police after driving into the wrong lane

Welcome back to TechCrunch’s Week in Review — TechCrunch’s newsletter recapping the week’s biggest news. Want it in your inbox every Saturday? Sign up here. This week, Figma CEO Dylan…

Figma pauses its new AI feature after Apple controversy

We’ve created this guide to help parents navigate the controls offered by popular social media companies.

How to set up parental controls on Facebook, Snapchat, TikTok and more popular sites

Lori Beer’s work is a case study for every CIO out there, most of whom will never come close to JP Morgan Chase’s scale, but who can still learn from…

You could learn a lot from a CIO with a $17B IT budget

For the first time, Chinese government workers will be able to purchase Tesla’s Model Y for official use. Specifically, officials in eastern China’s Jiangsu province included the Model Y in…

Tesla makes it onto Chinese government purchase list

Generative AI models don’t process text the same way humans do. Understanding their “token”-based internal environments may help explain some of their strange behaviors — and stubborn limitations. Most models,…

Tokens are a big reason today’s generative AI falls short

After multiple rejections, Apple has approved Fortnite maker Epic Games’ third-party app marketplace for launch in the EU. As now permitted by the EU’s Digital Markets Act (DMA), Epic announced…

Apple approves Epic Games’ marketplace app after initial rejections

There’s no need to worry that your secret ChatGPT conversations were obtained in a recently reported breach of OpenAI’s systems. The hack itself, while troubling, appears to have been superficial…

OpenAI breach is a reminder that AI companies are treasure troves for hackers

Welcome to Startups Weekly — TechCrunch’s weekly recap of everything you can’t miss from the world of startups. Sign up here to get it in your inbox every Friday. Most…

Space for newcomers, biotech going mainstream, and more

Elon Musk’s X is exploring more ways to integrate xAI’s Grok into the social networking app. According to a series of recent discoveries, X is developing new features like the…

X plans to more deeply integrate Grok’s AI, app researcher finds

We’re about four months away from TechCrunch Disrupt 2024, taking place October 28 to 30 in San Francisco! We could not bring you this world-class event without our world-class partners…

Meet Brex, Google Cloud, Aerospace and more at Disrupt 2024

In its latest step targeting a major marketplace, the European Commission sent Amazon another request for information (RFI) Friday in relation to its compliance under the bloc’s rulebook for digital…

Amazon faces more EU scrutiny over recommender algorithms and ads transparency

Quantum Rise, a Chicago-based startup that does AI-driven automation for companies like dunnhumby (a retail analytics platform for the grocery industry), has raised a $15 million seed round from Erie…

Quantum Rise grabs $15M seed for its AI-driven ‘Consulting 2.0’ startup

On July 4, YouTube released an updated eraser tool for creators so they can easily remove any copyrighted music from their videos without affecting any other audio such as dialog…

YouTube’s updated eraser tool removes copyrighted music without impacting other audio

Airtel, India’s second-largest telecom operator, on Friday denied any breach of its systems following reports of an alleged security lapse that has caused concern among its customers. The telecom group,…

India’s Airtel dismisses data breach reports amid customer concerns

According to a recent Dealroom report on the Spanish tech ecosystem, the combined enterprise value of Spanish startups surpassed €100 billion in 2023. In the latest confirmation of this upward trend, Madrid-based…

Spain’s exposure to climate change helps Madrid-based VC Seaya close €300M climate tech fund

Forestay, an emerging VC based out of Geneva, Switzerland, has been busy. This week it closed its second fund, Forestay Capital II, at a hard cap of $220 million. The…

Forestay, Europe’s newest $220M growth-stage VC fund, will focus on AI

Threads, Meta’s alternative to Twitter, just celebrated its first birthday. After launching on July 5 last year, the social network has reached 175 million monthly active users — that’s a…

A year later, what Threads could learn from other social networks

J2 Ventures, a firm led mostly by U.S. military veterans, announced on Thursday that it has raised a $150 million second fund. The Boston-based firm invests in startups whose products…

J2 Ventures, focused on military healthcare, grabs $150M for its second fund

HealthEquity said in an 8-K filing with the SEC that it detected “anomalous behavior by a personal use device belonging to a business partner.”

HealthEquity says data breach is an ‘isolated incident’

Roll20 said that on June 29 it had detected that a “bad actor” gained access to an account on the company’s administrative website for one hour.

Roll20, an online tabletop role-playing game platform, discloses data breach

Fisker has a willing buyer for its remaining inventory of all-electric Ocean SUVs, and has asked the Delaware Bankruptcy Court judge overseeing its Chapter 11 case to approve the sale.…

Fisker asks bankruptcy court to sell its EVs at average of $14,000 each

Teddy Solomon just moved to a new house in Palo Alto, so he turned to the Stanford community on Fizz to furnish his room. “Every time I show up to…

Fizz, the anonymous Gen Z social app, adds a marketplace for college students

With increasing competition for what is, essentially, still a small number of hard tech and deep tech deals, Sidney Scott realized it would be a challenge for smaller funds like…

Why deep tech VC Driving Forces is shutting down

A guide to turn off reactions on your iPhone and Mac so you don’t get surprised by effects during work video calls.

How to turn off those silly video call reactions on iPhone and Mac

Amazon has decided to discontinue its Astro for Business device, a security robot for small- and medium-sized businesses, just seven months after launch.  In an email sent to customers and…

Amazon retires its Astro for Business security robot after only 7 months

Hiya, folks, and welcome to TechCrunch’s regular AI newsletter. This week in AI, the U.S. Supreme Court struck down “Chevron deference,” a 40-year-old ruling on federal agencies’ power that required…

This Week in AI: With Chevron’s demise, AI regulation seems dead in the water