The Cybersecurity Directory

Back to search results

SailPoint is the leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organisations across the globe to build a security foundation capable of defending against today’s most pressing threats.

Main office address

SailPoint Technologies UK LTD
6th Floor, 85 Gracechurch Street

Telephone number

+44 (0) 207 283 0890


Key Products / Services / Sectors (USPs)

The SailPoint Identity Security Cloud provides a range of capabilities to help organisations to ensure that users have the right access to perform their roles, without being over-provisioned. In addition to providing IGA functions such as user provisioning, access certifications, access request and separation of duties controls, the solution enables in-depth understand of user access across cloud platforms (IaaS, SaaS), unstructured data in file systems and common cloud storage and deep controls over access in SAP.

The SailPoint Identity Security Cloud has a true multi-tenant, micro-services based architecture to provide scalability and security, allowing customers to focus on what matters in their identity programmes and increase value from the solution.

The platform incorporates artificial intelligence (AI) and machine-learning (ML) at the core to improve on common identity processes, making recommendations to users around access and showing exceptional or outlying access where risk is likely greater. ML is also used to help create and maintain a role model to further smooth delivery of access.

SailPoint provides a large number of connectors to platforms, applications and systems which provide automation around provisioning and deprovisioning, reducing the costs and effort associated with manual activies on access such as helpdesk agent time. Common systems have included connectors with a simple, wizard driven configuration. Other systems can leverage standards-based approaches with some additional configuration which allows for integration with almost all applications. Connected applications may be both in cloud and on-premises which means that a single identity solution can control access across the entire IT estate. Integrations are also available with other IT and security infrastructure, allowing identity data to be leveraged in other systems or processes to be executed externally (such as using ITSM for driving self-service access request, governed by the SailPoint platform). Publically documented APIs are provided for custom integration work and a no-code workflow engine is included to allow for automation of identity processes.

As an organisation focused on security, SailPoint implements strict compliance standards to help our customers comply with their own industry regulations. SailPoint completes SOC 1 Type 2 and SOC 2 Type 2 audits annually and maintains ISO27001 certification


Backup and disaster recovery

Backup solutions

Incident response

Disaster recovery solutions

Disaster Recovery as a Service (DRaaS)

Penetration testing

Vulnerability scanning

Automated test tools

Web app PEN tests

Mobile app/IoT PEN tests

Social engineering PEN tests

Red Teams

Cybersecurity awareness training programs

On-site training programs

Online training

Interactive training videos


Automated phishing simulations

Cybersecurity consultancy

Compliance assistance

Security assessment, policy help, strategic advise

Information risk assessment

Privacy Impact Assessment services

Security architecture

Digital forensics and investigation services

Security and data protection audit

Network security

Data Loss Prevention (DLP)

Distributed denial of service (DDoS) prevention

Email security

Firewalls and web access firewalls (WAF)

Network segmentation

Security information and event management (SIEM)

Other intrusion detection (Machine Learning / AI based)

Endpoint security solutions

Mobile security


IoT security

Endpoint Detection and Response (EDR)

Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement


URL filters

Security email gateway


Print management and security

Threat intelligence monitoring and detection

Consultancy and advice

User and Entity Behavior Analytics (UEBA)

Security information and event management (SIEM)

Network Traffic Analysis Framework

Web Proxy

Cybersecurity Platform

Phishing detection

Fraud detection

Rogue or Fake Mobile App Detection

Surface, “Deep” and “Dark” Web Monitoring

Social media monitoring

Brand Monitoring

Managed security services (MSSP)

Protective monitoring

Incident response

Vulnerability management

Threat management

Telco security

Security help desk and support

Staff training

Identity and access management

Identity provisioning (IDP)

Data verification

Data orchestration services

Identity hub

Authentication (credential) of citizens

Authentication (credential) of employees and other internal persons

Anti-fraud services, e.g. behavioural monitoring

Attribute provisioning and verification

Identity networks

Identity apps

Privacy and consent management

Privileged access management (PAM)
















Main point of contact

Name: Matthew Cooper


Phone: 07970483963