DECEMBER 2018
 
Is this email not displaying correctly?
View it in your browser.
 
 
 
 
 
 
 

Saviynt Converge ‘18: Where Identity Meets Security

 

As part of the ongoing commitment to deliver the industry’s best and most innovative identity governance solution, Saviynt announced several technology innovations and shared best practices with customers and partners. Saviynt highlighted four key areas of innovation that showcase the continued advancement of our award-winning identity management solutions, including: Cloud Privileged Access Management (PAM), Internet of Things (IoT) and Robotic Process Automation (RPA), Deeper Enterprise Application Integrations, and Expanded Technology Integrations.

 
Read Press Release
 
 
 
 
 

Saviynt announces winners of 2018 Partner Awards at Saviynt Converge

 

The winners of the 2018 Saviynt Partner Awards  were recognized at Saviynt’s annual event, Converge ‘18, which was held on December 2nd, 2018 in Las Vegas, NV. Our partners are the key to Saviynt’s growth in the identity governance market. View all 11 winners by clicking below.

 
Read Press Release
 
 
 
 
 

TOP 10 cloud consulting/service provider for the government sector

 

In an recent interview with GovCIO, Matthew Schmidt, VP of Public Sector Sales discussed cloud adoption in the government space, a heavily regulated market. Most central and state governments are attempting to modernize operations to effectively serve its citizens. Saviynt is currently FedRAMP Moderate/IL4 (AWS GovCloud) in process, FIPS 140-2 NIST validated AWS GovCloud & Azure Government Cloud, and Dedicated US Government SOC. Learn more about how to apply a modern approach toward security and you need to forget about the traditional on-premise approach.

 

Read More
 
 
 
 
 

Saviynt received the highest product scores in 2 of 4 uses cases for Midsize or Large Enterprise and Governance-Focused

 

As an essential companion to the Gartner Magic Quadrant, the Gartner Critical Capabilities for IGA methodology provides deeper insight into providers’ product and service offerings by extending the Magic Quadrant analysis. Use this research to further investigate product and service ratings based on key capabilities set to important, differentiating use cases.

 
Read Report
 
 
 
 
 

Webinars

 

Watch the recordings of our latest webinars:

 
News Image
 

Integrate and Virtualize Saviynt’s Identity Warehouse with RadiantOne for use in LDAP Applications, WAM, and Federation

News Image
 

Achieving Compliance and Maintaining Security in a Fluid Cloud Environment

 
 
 
Watch Recording
Watch Recording
 
 
 
 
 
 

FROM THE BLOG

 
News Image
 

Modern GRC Controls: Starting with the Basics

 

In this digital age, it is critically important that businesses protect their assets whether it is their people, processes or the information that drives their business. Establishing robust governance, risk mitigation and compliance as part of their culture of Information Technology controls underlie their success.

News Image
 

Modern GRC: What is Change and How to Adapt

 

Making changes to what is important to you and your company becomes clear in hindsight, but a little reflection of what is important and impactful will definitely help. This is a concept I constantly recall when looking at Policies and Procedures that companies consider when implementing Risk-based Controls.

 
 
 
Read More
Read More
 
 
 
 
News Image
 

Modern GRC Blog: Complex Environments

 

Evolution in GRC is necessary to ensure an appropriate security posture across hybrid IT. So, in this next series of posts, I’ll outline specifics on how to update and modernize your GRC) efforts from static, one-time access reviews and certifications into a dynamic, modern continuous-monitoring environment.

News Image
 

A Haiku to Identity Governance – My Thanksgiving

 

In the early days of identity it was a painful process of just trying to reconcile accounts between systems, write scripts to link identities, compile code to create “connectors”. We didn’t have best practices yet, we barely knew how to get data out once we’d gotten it in, and as a result there was an awful lot of shoot-from-the-hip.

 
 
 
Read More
Read More