;

Is Digital Privacy Even Possible? We Asked Sailpoint’s Global Evangelist

Is Digital Privacy Even Possible? We Asked Sailpoint’s Global Evangelist

Mike kiser Leaks are having a moment. Employees at Google and Facebook routinely leak details about company culture and labor practices to journalists, and Donald Trump’s White House has been termed “the leakiest White House in history.” Technology can help prevent this outpouring of confidential information, but not all […]

Leaks are having a moment. Employees at Google and Facebook routinely leak details about company culture and labor practices to journalists, and Donald Trump’s White House has been termed “the leakiest White House in history.”

Technology can help prevent this outpouring of confidential information, but not all of it. The New York Times, for example, has both published leaks and been the subject of them. When it comes to internal data leaks, however, the tech industry can reduce their occurrences with something called “identity governance.” If you’re not sure what that is, Mike Kiser of Austin-based Sailpoint Technologies is here to help.

“In a nutshell,” Kiser says, “it’s making sure the right people have the right access to the right data or capabilities within an enterprise.”

Specializing in smart identity governance, Sailpoint’s AI-informed platform reserves access to sensitive information for only those who really need it while automatically identifying signs of leakage and data breaches.

Built In spoke with Kiser about Sailpoint’s platform and why it’s more relevant than ever:

How does Sailpoint’s platform handle privacy and data security?

It basically makes sure that people only have the capabilities or the access to data they need to do their job, and nothing more. We’re trying to minimize the security risk, really — minimize access to that sensitive data or whatever else you want to protect, and reduce the chance of a nefarious actor using it for bad purposes. No one gets blanket access to everything within an organization. Instead, people automatically and consistently get the necessary database or application privileges.

That spans everything from Cloud-based applications all the way down to legacy mainframes. It’s important to have that holistic view, because if you

admin

Read Previous

Trump winning trade war with China even as White House blinks

Read Next

Saudi Arabia ‘a prime target for hackers,’ cyber experts warn

Leave a Reply

Your email address will not be published. Required fields are marked *