Press ReleaseCloud SecurityIdentity & Access

SailPoint Connectivity to Support Thousands of Apps & Custom Integrations

SailPoint Technologies, Inc., a leader in unified identity security for enterprises, today announced that SailPoint Connectivity, a key component of the unified SailPoint Atlas platform, now supports connectivity for more than 1,100 enterprise applications and 20,000 custom applications. SailPoint Connectivity allows customers to extend, connect, and integrate core identity security capabilities with the critical business applications they use every day, all under a single identity umbrella. This is essential in jumpstarting identity security time-to-value.

Connecting to the digital ecosystem is a critical part of every enterprise’s identity security journey. Without it, an identity solution cannot appropriately govern access to the countless applications and systems organisations use every day. This is a common challenge among legacy identity security implementations, where connectivity is lacking. Thousands of SailPoint connectors that streamline application integration help alleviate this pain point and improve time-to-value for customers needing to secure business-critical applications. This also includes custom or homegrown applications, enabling customers to effectively manage identities across any application.

Sailpoint

“SailPoint is one of those rare security products that both makes things easier for the business and delivers strategic value,” said Lachlan McGill, General Manager of Cyber Risk and Compliance at Salvation Army. “The comprehensiveness of the SailPoint integrations was very important to us, as was the ability to easily build custom connectors. It’s great to be able to report to the Board and senior executives about the controls we have around identity.”

SailPoint Connectivity offerings include deep integrations with strategic customer applications; comprehensive vertical and category connectivity; and standard, low-code connectivity tools to effectively integrate and extend SailPoint identity security to the business-critical applications, software, and systems that enterprises use most. The breadth and depth of SailPoint Connectivity help organisations quickly govern and secure access throughout the application lifecycle. Additionally, SailPoint’s recently introduced application onboarding for SailPoint Identity Security Cloud uses AI-powered recommendations to discover and apply identity security policy to ungoverned applications for complete application lifecycle management. This includes suggesting configuration options, delivering confidence-backed identity-to-account correlation, and reducing the overall complexity and setup of application connectivity.

“Enterprise security is both constant and continuous, and baseline visibility into access across applications must come first,” said Grady Summers, EVP, Product, SailPoint. “With tens of thousands of connectivity options and strategic integrations, SailPoint Connectivity gives our customers an in-depth and seamless solution to apply unified identity security functionality to the applications they use every day. By securely, efficiently, and comprehensively providing the right access to key applications, we’re helping customers accelerate their program right out of the gate and see immediate value.”

“An essential consideration for Currys in selecting SailPoint was the product’s integration capabilities. Currys used SailPoint’s integrations to connect to SAP ECC and S4 seamlessly.” Nicholas Rossiter, Head of Technology Risk, Currys. “SailPoint’s connectors and integrations have worked well for us. They’ve been one of the success factors for our deployment. We’ve even used API calls to automate integrations with some of our legacy systems, and it’s worked quite nicely.”

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *