The concept is really pretty simple. Cloud identity governance makes it possible to see and control user access to all your applications and data — in the cloud and on-premises. It helps your organization stay secure and compliant at the same time.
Cloud identity governance helps you answer three critical questions:
Who has access to your applications and files?
What they can do with that access?
How is that access being used?
If you’ve got compliance requirements, you know auditors want to see proof that you’re reviewing and certifying appropriate user access. The good news is that you don’t have to manually track this on spreadsheets anymore. Our automated process can cut your certification time from months to weeks.
With self-service, users request access to applications and files and get instant access if your policy settings or an IT manager approves it. Not sure whether to approve? AI-driven recommendations can tell you whether granting access is risky or not.
Artificial intelligence and machine learning
SailPoint Predictive Identity gives you advanced governance capabilities. When it discovers suspicious or unusual access, it prompts you to review access and certification so you can take action.
Grant and remove access as users onboard, change roles or leave the organization. This includes your employees, contractors, partners, vendors and even bots.
File access management
PDFs and files in Word, Excel and PowerPoint are prime targets for cybercriminals because they often contain sensitive information and are easy to hack. SailPoint helps you identify which files contain sensitive information (like PII and PHI), control who has access to them and get alerted if there is any strange or suspicious behavior happening with those files.
Empower your users to reset their own passwords. That may not sound exciting but when you’re locked out and can’t get your work done, self-service password reset from anywhere, anytime is a huge benefit. Our password management also lets you control security settings like password strength and push out organization-wide password resets
Create rules and policies that determine if, when, and how much access can be granted to a user. You can prevent the risk of granting too much access within applications like SAP, AWS and Salesforce and assign multiple people to high-risk or sensitive tasks to reduce the potential for malicious behavior.