SailPoint Offers Identity Management for Cloud Adoption

While many companies are deploying software as a service (SaaS Relevant Products/Services) applications and have selectively deployed enterprise applications in private clouds, very few have moved mission-critical applications to the public cloud Relevant Products/Services. In fact, a recent SailPoint survey of Global 1000 showed that only 7% of respondents have moved compliance-relevant applications to the public cloud; security and compliance issues were the primary inhibitors to cloud adoption.



SailPoint is helping companies address these compliance and security barriers with a new solution, the Cloud Identity Bridge, which seamlessly extends the identity management capabilities of SailPoint IdentityIQ to all applications deployed in cloud environments. With Cloud Identity Bridge, SailPoint is removing key roadblocks to cloud adoption by enabling organizations to manage identities and access privileges in the cloud in the same manner that they govern them for applications in the datacenter.

While many companies are deploying software as a service (SaaS) applications and have selectively deployed enterprise applications in private clouds, very few have moved mission-critical applications to the public cloud. In fact, a recent SailPoint survey of Global 1000 showed that only 7% of respondents have moved compliance-relevant applications to the public cloud; security and compliance issues were the primary inhibitors to cloud adoption.

"Organizations face too many unknowns related to compliance and security in cloud environments to consider moving mission-critical IT assets there," said Darran Rolls, CTO of SailPoint. "Yet, many business Relevant Products/Services units are already deploying SaaS applications without engaging the IT organization, creating major gaps in the visibility and control over potentially sensitive data. In order to safely adopt cloud computing, companies need to govern identity and access data deployed in the cloud in the same manner that they govern applications in the datacenter."







More Here


Courtesy:http://www.enterprise-security-today.com/story.xhtml?story_id=01300000LPMI