SAUDI THALATE GROUP

SailPoint

Product Overview

Discover, manage and secure access for all identity types across your entire organization, anytime and anywhere.

Access Certification

If you’ve got compliance requirements, you know auditors want to see proof that you’re reviewing and certifying appropriate user access. The good news is that you don’t have to manually track this on spreadsheets anymore. Our automated process can cut your certification time from months to weeks.

Access Requests

A small river named Duden flows by their place and supplies it with the necessary regelialia. It is a paradiseWith self-service, users request access to applications and files and get instant access if your policy settings or an IT manager approves it. Not sure whether to approve?

Artificial Intelligence and Machine Learning

SailPoint predictive identity gives you advanced governance capabilities. When it discovers suspicious or unusual access, it prompts you to review access and certification so you can take action.

Automated Provisioning

Grant and remove access as users onboard, change roles or leave the organization. This includes your employees, contractors, partners, vendors, and even bots.

File Access Management

PDFs and files in Word, Excel and PowerPoint are prime targets for cybercriminals because they often contain sensitive information and are easy to hack. SailPoint helps you identify which files contain sensitive information (like PII and PHI), control who has access to them and get alerted if there is any strange or suspicious behavior happening with those files.

Password Management

Empower your users to reset their own passwords. That may not sound exciting but when you’re locked out and can’t get your work done, self-service password reset from anywhere, anytime is a huge benefit. Our password management also lets you control security settings like password strength and push out organization-wide password resets

Separation-Of-Duties

Create rules and policies that determine if, when, and how much access can be granted to a user. You can prevent the risk of granting too much access within applications like SAP, AWS, and Salesforce and assign multiple people to high-risk or sensitive tasks to reduce the potential for malicious behavior.