Press ReleaseCyber SafetyIdentity & Access

SailPoint Machine Identity Security to Help Simplify Management, Security, and More

Sailpoint Is Expanding Beyond Human Identity Governance into the Rapidly Growing Field of Machine Identities

SailPoint Technologies, Inc., a leader in unified identity security for enterprises, today announced the launch of SailPoint Machine Identity Security, a new Identity Security Cloud product. SailPoint Machine Identity Security is a dedicated product built specifically for machine accounts such as service accounts and bots.

Built on SailPoint Atlas, the SailPoint Machine Identity Security unifies the process of identity security for both machine and human identities, allowing enterprises to manage all identities in a more simplified, holistic manner.

Why SailPoint Machine Identity Security Matters

SailPoint’s recent research report, “Machine identity crisis: The challenges of manual processes and hidden risks,” found that 66% of the companies surveyed still rely on cumbersome manual processes to manage machine identities, with just 38% having real-time visibility into active machine identities. It comes as little surprise, then, that 72% of the professionals surveyed find machine identities more difficult to manage than human identities, underscoring the growing need for streamlined, automated identity solutions.

The report found that 88% of security professionals surveyed worry that deleting an inactive machine identity might disrupt operations in unforeseen ways, further highlighting the unnecessary risks that accompany a lack of visibility and control.

Nearly 70% of surveyed companies say they are now managing more machine identities than human identities, and that number is only likely to grow with time. In fact, surveyed organizations expect machine identities to increase about 30% in the next three to five years, growing faster than all other identity types. With attackers targeting machine identities with increased regularity, today’s enterprises need effective machine identity management more than ever.

Strengthening Security with SailPoint Machine Identity Security

SailPoint Machine Identity Security strengthens an organisation’s security posture by reducing the risk associated with orphaned and unmanaged machine identities. The new product enables organisations to discover machine accounts, more easily classify and tag them, assign human ownership that remains up to date amid changing conditions, and certify access to ensure unnecessary accounts and permissions are revoked.

By enabling enterprises to manage machine identities with the same degree of visibility, governance and control as human identities, Machine Identity Security helps make the process of identity security simpler and more comprehensive. Additionally, automating the governance and lifecycle management process helps organisations approach the compliance process with greater confidence, helping ease any regulatory concerns.

“Machine identities are just as vulnerable to attackers as human identities,” said Ben Cody, SVP, Product, at SailPoint. “In some ways, machine identities can be even more vulnerable to attackers than human identities. Treating them differently from human identities just doesn’t make sense in today’s threat landscape—enterprises need the same level of visibility and control that they’ve come to expect over their human identities.”

He added: “Built on SailPoint Atlas, Machine Identity Security is a unified product that can help manage human and machine identities with equal rigor, and its ability to automate and scale with minimal manual intervention can set enterprises up for both short and long-term success.”

For more information, visit the SailPoint website.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *