SailPoint is the leading provider of identity security for the modern enterprise. Enterprise security starts and ends with identities and their access, yet the ability to manage and secure identities today has moved well beyond human capacity. Using a foundation of artificial intelligence and machine learning, the SailPoint Identity Security Platform delivers the right level of access to the right identities and resources at the right time—matching the scale, velocity, and environmental needs of today’s cloud-oriented enterprise. Our intelligent, autonomous, and integrated solutions put identity security at the core of digital business operations, enabling even the most complex organisations across the globe to build a security foundation capable of defending against today’s most pressing threats.
Share
Main office address
SailPoint Technologies UK LTD
6th Floor, 85 Gracechurch Street
London
EC3V 0AA
Key Products / Services / Sectors (USPs)
The SailPoint Identity Security Cloud provides a range of capabilities to help organisations to ensure that users have the right access to perform their roles, without being over-provisioned. In addition to providing IGA functions such as user provisioning, access certifications, access request and separation of duties controls, the solution enables in-depth understand of user access across cloud platforms (IaaS, SaaS), unstructured data in file systems and common cloud storage and deep controls over access in SAP.
The SailPoint Identity Security Cloud has a true multi-tenant, micro-services based architecture to provide scalability and security, allowing customers to focus on what matters in their identity programmes and increase value from the solution.
The platform incorporates artificial intelligence (AI) and machine-learning (ML) at the core to improve on common identity processes, making recommendations to users around access and showing exceptional or outlying access where risk is likely greater. ML is also used to help create and maintain a role model to further smooth delivery of access.
SailPoint provides a large number of connectors to platforms, applications and systems which provide automation around provisioning and deprovisioning, reducing the costs and effort associated with manual activies on access such as helpdesk agent time. Common systems have included connectors with a simple, wizard driven configuration. Other systems can leverage standards-based approaches with some additional configuration which allows for integration with almost all applications. Connected applications may be both in cloud and on-premises which means that a single identity solution can control access across the entire IT estate. Integrations are also available with other IT and security infrastructure, allowing identity data to be leveraged in other systems or processes to be executed externally (such as using ITSM for driving self-service access request, governed by the SailPoint platform). Publically documented APIs are provided for custom integration work and a no-code workflow engine is included to allow for automation of identity processes.
As an organisation focused on security, SailPoint implements strict compliance standards to help our customers comply with their own industry regulations. SailPoint completes SOC 1 Type 2 and SOC 2 Type 2 audits annually and maintains ISO27001 certification
Services
Backup and disaster recovery
Backup solutions
Incident response
Disaster recovery solutions
Disaster Recovery as a Service (DRaaS)
Penetration testing
Vulnerability scanning
Automated test tools
Web app PEN tests
Mobile app/IoT PEN tests
Social engineering PEN tests
Red Teams
Cybersecurity awareness training programs
On-site training programs
Online training
Interactive training videos
Quizzes
Automated phishing simulations
Cybersecurity consultancy
Compliance assistance
Security assessment, policy help, strategic advise
Information risk assessment
Privacy Impact Assessment services
Security architecture
Digital forensics and investigation services
Security and data protection audit
Network security
Data Loss Prevention (DLP)
Distributed denial of service (DDoS) prevention
Email security
Firewalls and web access firewalls (WAF)
Network segmentation
Security information and event management (SIEM)
Other intrusion detection (Machine Learning / AI based)
Endpoint security solutions
Mobile security
Anti-malware
IoT security
Endpoint Detection and Response (EDR)
Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement
Sandboxes
URL filters
Security email gateway
VPN
Print management and security
Threat intelligence monitoring and detection
Consultancy and advice
User and Entity Behavior Analytics (UEBA)
Security information and event management (SIEM)
Network Traffic Analysis Framework
Web Proxy
Cybersecurity Platform
Phishing detection
Fraud detection
Rogue or Fake Mobile App Detection
Surface, “Deep” and “Dark” Web Monitoring
Social media monitoring
Brand Monitoring
Managed security services (MSSP)
Protective monitoring
Incident response
Vulnerability management
Threat management
Telco security
Security help desk and support
Staff training
Identity and access management
Identity provisioning (IDP)
Data verification
Data orchestration services
Identity hub
Authentication (credential) of citizens
Authentication (credential) of employees and other internal persons
Anti-fraud services, e.g. behavioural monitoring
Attribute provisioning and verification
Identity networks
Identity apps
Privacy and consent management
Privileged access management (PAM)