Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

3/26/2009
06:13 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SailPoint Adds Virtualization, Hosted, Managed Services Options To Identity Governance Solution

SailPoint IdentityIQ includes a virtual appliance, a hosting option, and a menu of managed services to simplify the process of buying, implementing, and managing identity management solutions

Austin, Texas, March 23, 2009 " SailPoint today announced a suite of new deployment offerings for its identity governance solution, SailPoint IdentityIQ, including a virtual appliance, a hosting option and a menu of managed services, to streamline and simplify the process of buying, implementing and managing identity management solutions. These new options, in addition to SailPoint's conventional hardware appliance and software licensing offerings, give customers a broader range of deployment environments to fit their specific situation, providing immediate ROI and better control over technology costs.

SailPoint's new deployment options adapt to unique customer requirements, such as those of a global bank that needed IdentityIQ to address compliance requirements but faced a three month delay for the procurement of hardware and system software to run the application. The IdentityIQ managed hosting option enabled them to stay within their original project plan while maintaining the flexibility to migrate back to a traditional software deployment in the future if their needs change. A leading financial services provider chose to implement IdentityIQ in a virtualized environment, which allowed them to make use of extra data center capacity and to deploy IdentityIQ very quickly to address their identity governance business needs.

"The down economy is forcing companies to strengthen their identity management practices and access controls," said Ian Glazer, senior analyst at Burton Group. "In order to help companies meet their needs in this economy, vendors have to address immediate business problems, and they also have to be creative with licensing and deployment models."

SailPoint developed its new delivery options, available through SailPoint and its partners, to provide more flexible deployment, maintenance, and operating models for organizations facing constrained IT resources and lower IT budgets. Identity governance remains a top priority, but many organizations lack the internal resources needed to deploy and manage new applications. That was the case with a Fortune 500 organization that was in the process of being acquired by a larger company. By using SailPoint's hosted solution for IdentityIQ, the company was able to quickly deploy IdentityIQ for access certifications and policy enforcement, providing proof of compliance with Sarbanes-Oxley before, during and after the acquisition.

SailPoint's new deployment options include:

Virtual Appliance: IdentityIQ is installed as a pre-built software solution in the customer's data center on the virtualization platform of their choice. The appliance is packaged for rapid deployment in a client's existing virtual infrastructure and reduces deployment time and expenses by using a pre-configured software stack.

Managed Hosting: IdentityIQ is deployed at a SailPoint hosting facility, including all required software, services and support. It helps ensure that costs are more predictable by eliminating the need to procure hardware or additional internal IT support.

Managed Services Packages: Based on their specific needs, customers can completely outsource the operation and maintenance of IdentityIQ hardware appliances or virtual appliances to reduce the total cost of ownership for maintaining and managing the software. This reduces the burden on internal IT resources, which is important given tightened budgets and reduced or overstretched staffs.

Because of the sensitive nature of identity governance implementations, SailPoint has undergone rigorous testing to ensure the virtual appliance and managed hosting offerings meet " and in many cases exceed " the security requirements of a Global 1000 company. Each customer's hosted environment is managed in an isolated instance at a secure, controlled data center environment that is SAS70 and ISO 27001 certified, and uses the latest firewall protection, intrusion detection systems, SSL encryption, and purpose-built security products to insure customer data is protected against unauthorized access.

"In the face of today's challenging economic environment, businesses are moving to reduce IT costs while delivering critical business systems, including regulatory compliance," said Terry Jost, CEO of Mycroft, Inc. "SailPoint is addressing these challenges by providing faster, less costly, and less risky delivery methods to deliver near term business value. We're seeing great results from our partnership to provide software delivery models to make it easier for companies to buy, deploy and maintain their software."

About SailPoint SailPoint Technologies, Inc. develops identity governance software that helps organizations gain control over user access to critical systems and data, streamline costly IT compliance processes and reduce the risks of fraud, corporate data loss or theft and failed audits. Founded in December 2005, SailPoint is based in Austin, Texas.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).