How do you integrate IAM with other cybersecurity solutions, such as cloud infrastructure entitlement management (CIEM) and privileged access management (PAM), to provide a more comprehensive and effective security posture?

3.8k viewscircle icon1 Comment
Sort by:
Director, Special Projects, IT/OT Security in Energy and Utilities2 years ago

We currently use SailPoint to manage our access multiple applications and platforms. Preferably we use APIs to integrate. The data flows both directions. SailPoint provisions and revokes in the system and also keeps up with who has what access in the application, so we know if any access was added in another way. 

Other applications are manual for provisioning and deprovisioning and we gather who has what permissions back into SailPoint from a flat file generated daily.

By the time we finish the scope of our program, we will have integrated ~300 systems and platforms into SailPoint.  We also use it to monitor for SODs both withing a system and between systems.  (Exception is SAP - intra-application SODs are detected by SAP GRC.)

There are other applications besides SailPoint that do this same functionality, so I recommend you look at alternatives.  When I joined the our next gen ERP program, the tool had already been selected so I don't have a great grasp on the overall market for these tools. 

Lightbulb on1

Content you might like

Yes59%

It’s being discussed25%

No15%

View Results

Completely confident19%

Mostly confident73%

Not quite confident6%

Not at all confident1%

View Results