SailPoint, Inc. (SailPoint) delivers solutions to enable comprehensive identity security for the enterprise.
The company does this by unifying identity data across systems and identity types, including employee identities, non-employee identities, and machine identities. The company's SaaS and customer-hosted offerings leverage intelligent analytics to provide organizations with critical visibility into which identities currently have access to which resources, which identities should have acce...
SailPoint, Inc. (SailPoint) delivers solutions to enable comprehensive identity security for the enterprise.
The company does this by unifying identity data across systems and identity types, including employee identities, non-employee identities, and machine identities. The company's SaaS and customer-hosted offerings leverage intelligent analytics to provide organizations with critical visibility into which identities currently have access to which resources, which identities should have access to those resources, and how that access is being used. The company's solutions enable organizations to establish, control, and automate policies that help them define and maintain a robust security posture and achieve regulatory compliance. Powered by AI, the company's solutions enable organizations to overcome the scale and complexity of managing identities in real-time across dynamic, complex IT environments.
During its nearly 20-year history, the company has continuously evolved its offerings to address the most pressing challenges in identity security. The company offers multiple identity solutions to meet the diverse needs of its customers across a full range of deployment options. The SailPoint Identity Security Cloud is built on the company's unified Atlas platform and enables organizations to consume the identity solution as a SaaS offering. IdentityIQ is the company's customer-hosted identity security solution and meets the needs of organizations that are not able or ready to implement a SaaS solution.
The company's Identity Security Cloud, built on Atlas, enables organizations to deliver the critical elements needed to build, maintain, and scale a strong, enterprise-class, identity security environment. The company's solutions address nearly all types of systems and identities, including data and applications, employee identities, non-employee identities, and machine identities, and enable smarter access decisions, improve business processes, and provide deeper understanding of identity and access.
The company's solutions are underpinned by several key differentiators:
The company's modular, extensible, and scalable Atlas platform, with its unified architecture and deep integration capability, provides the foundation for continued product innovation; The company's Identity Cube provides a 360-degree view of every enterprise identity, enabling a multidimensional approach to access management that encompasses various aspects of identity, such as attributes, entitlements, and effective permissions; and The company's use of AI and automation throughout its platform enhances decision-making, accelerates risk detection, and delivers seamless integrations.
Growth Strategies
The key elements of the company’s strategy are to drive new customer growth; expand existing customer relationships; continue to leverage and expand its network of partners and alliances; expand its global footprint; and continue to innovate and expand its portfolio.
Products
Identity Security Cloud
SailPoint Identity Security Cloud is the company's cloud-based identity security solution, which allows organizations to centrally discover, manage, and secure all enterprise identity types, and the data and cloud infrastructure associated with them. This offering is built on Atlas, the company's unified, extensible, multi-tenant SaaS platform. The Atlas platform enables Identity Security Cloud to unify several capabilities into a single pane of glass and is extensible to allow for the development of new capabilities and modules over time. Throughout its SaaS transformation, the company was intentional in taking a longer and more expensive path, decomposing logic that held key intellectual property and rebuilding those same components in a new scalable micro-services-based architecture, to ensure its ability to maximize customer value into the future. Atlas serves as the foundation for SailPoint Identity Security Cloud and delivers the critical elements needed to build, maintain, and scale a strong, enterprise-class identity security program. The platform is designed to utilize AI to enable rapid development and easy integration into new capabilities, acquired technologies, and customer environments. After its significant investment, the company has developed its Identity Security Cloud solution to meet the most stringent identity governance requirements and provide enterprise-grade service that meets its customers' scalability, performance, availability, and security demands.
The company's Identity Security Cloud features a set of fully integrated capabilities, including:
Lifecycle Management: Empowers organizations to securely and cost-effectively manage access to applications and data throughout a business user’s lifecycle within an organization, reducing risk to the business, brand, and bottom line. Whether that business user is an employee, contractor, or business partner, the company's self-service access request capability empowers business users to take an active role in managing changes to their access through an intuitive user interface, greatly reducing the burden on security and IT organizations. With the company's offerings, business users can actively change user access through automatic provisioning via a large library of direct connectors for thousands of applications, such as Workday and SAP, or synchronization with IT service management solutions, such as ServiceNow.
Compliance Management: Supports the improvement of compliance and audit performance while lowering costs related to compliance professionals and regulatory expenses. It provides user-friendly access certifications and automated policy management controls, such as segregation of duty violation reporting, that are designed to simplify and streamline audit processes across all applications and data. With built-in audit reporting and analytics, IT, business, and audit teams now have critical visibility into, and management over, all compliance activities in the organization.
Access Modeling: Enables customers to quickly create and implement enterprise roles to support a least privilege model, providing a smarter way to build, maintain, and optimize roles with continual adjustment of access across the organization. Through core features such as common access roles, role discovery and insights, and peer group analysis, the company's AI-based capability allows organizations to grant access on a strictly as-needed basis, developing effective access models that support appropriate business user access without compromising security.
Analytics: Leverages AI to turn vast quantities of data, including attributes, roles, and history, into actionable insights to make better decisions faster, spot risky access sooner, and improve overall business security. In addition to tracking, reporting, and gauging the value of an organization’s identity security program, this capability provides an audit trail and complete visibility into access changes and historical information on entitlements, roles, and governance. With the company's analytics offering, customers can view activity data at the application level, compare usage with peers, and discover identities with access anomalies.
In addition to the core integrated capabilities, organizations can extend the value of the company's Identity Security Cloud with additional products, including:
Non-Employee Risk Management: Enables organizations to streamline the administration of non-employee identity lifecycles to enhance third-party security and data integrity and support regulatory compliance. The company's Non-Employee Risk Management offering implements comprehensive risk-based identity access for all third-party non-employee identities, including contractors, partners, and vendors. SailPoint Non-Employee Risk Management extends advanced identity security controls to provide visibility and security into the complex and dynamic lifecycles of non-employee identities. The module features flexible workflows and customizable forms to streamline processes and enable seamless collaboration between internal and external parties.
Data Access Security: Secures access to the growing amount of unstructured data stored in cloud storage systems to empower organizations to discover, govern, and secure crucial unstructured data and protect it from critical security risks. Designed as an integrated SaaS solution with Identity Security Cloud, the company's Data Access Security offering delivers enhanced intelligence on critical data to improve data security posture, reduce risk, and streamline compliance efforts. With this offering, security teams are able to proactively uncover and remediate hidden data risks with automated data discovery and classification, built-in governance workflows, and out-of-the-box governance policies, increasing their productivity and radically improving their visibility into pivotal organization data.
Password Management: Provides business users an intuitive, self-service experience for managing and resetting passwords from any device and from anywhere, reducing the reliance on IT and security staff, and enforcing greater password security. The company's Password Management offering enforces consistent and secure password policies for all users across all systems from the cloud to the data center by detecting password changes initiated outside of the Identity Security Cloud and synchronizing them to maintain a stronger organization-wide password security posture. Offering a self-service model, business users are able to reset, change, or recover passwords, allowing them to stay connected and productive while enhancing the security of the broader organization.
Access Risk Management: Enables organizations to eliminate fraud, optimize compliance processes, and ensure audit readiness by unifying identity security controls and Separation of Duties monitoring across enterprise resource planning (ERP) and other apps in the business ecosystem. The company's offering effectively centralizes access risk governance by providing seamless GRC integration and extensive enterprise visibility to forecast and prevent Separation of Duties violations across an organization’s ERP systems, such as SAP. With Access Risk Management, organizations can automate access reviews, document risk mitigation controls, oversee emergency access, conduct proactive risk simulations, and effortlessly maintain compliance to reduce audit deficiencies and breaches.
Cloud Infrastructure Entitlement Management (CIEM): Empowers organizations to extend identity security to their cloud infrastructure, including AWS, Google Cloud Platform (GCP), and Microsoft Azure, to ensure compliance and security throughout their entire technology ecosystem. CIEM enables customers to discover, manage, govern, and remediate enterprise cloud infrastructure access with a single approach, gaining deeper understanding of their cloud resources and better visibility into their business user’s cloud privileges. Leveraging AI, CIEM enables cloud resource entitlement permissioning, not only on an access level, but on an action level, determining a business user's ability to read, write, and administrate cloud data.
Privileged Task Automation: Enables organizations to automate and delegate the execution of repeatable privileged tasks. Privileged task automation (PTA) allows users to execute common privileged tasks without sharing privileged credentials or the need for a privileged session by providing a centralized repository, low-code automation, and out-of-the-box templates for privileged task workflows. With PTA, organizations can reduce their reliance on advanced privileged access capabilities and empower general IT staff to provide better service, accelerate adoption, and improve productivity.
Machine Identity Security: Enables organizations to achieve governance, compliance, and security outcomes for machine accounts. With machine identity security (MIS), organizations can discover, classify, assign, certify, and oversee ownership of service accounts, bots, and other machine accounts with minimal configuration adjustments and without extensive manual processes. MIS consolidates the securing of machine accounts to allow for full lifecycle coverage and reduces the risk of orphaned or unmanaged accounts. With an intuitive interface, MIS can assign human owners, periodically and consistently review configuration, and remain compliant across their IT infrastructure while safeguarding critical systems.
IdentityIQ
IdentityIQ is the company's customer-hosted identity security solution providing large, complex customers, who are highly interested in data localization in territories where the company does not host its cloud software, a unified and highly configurable identity security solution. IdentityIQ allows organizations to empower users to request and gain access to enterprise applications and data while managing compliance using automated access certifications and policy management.
Similar to its Identity Security Cloud offering, the company packages and prices IdentityIQ into capabilities with unique functionality, including Lifecycle Manager; and Compliance Manager.
Connectors and Integrations: Provides organizations with the ability to connect to applications, mainframes, cloud infrastructure, and data sources from across a hybrid IT environment to centrally manage and control access, enforce consistent policies, and understand risks. Connectivity to additional mission-critical software and systems provides essential visibility into an organization's entire IT ecosystem and provides the company's IdentityIQ customers with the integrated functionality necessary to effectively address the vast number of applications incorporated into the modern enterprise stack.
In addition to the core IdentityIQ capabilities, organizations can extend the value of the solutions with additional products, including:
File Access Manager: Secures access to the growing amount of data stored in file servers, collaboration portals, mailboxes, and cloud storage systems to equip organizations with the ability to quickly identify and mitigate compliance and data risks. File Access Manager helps organizations identify where sensitive data resides, who has access to it, and how they are using it—and then puts effective controls in place to secure it. By augmenting identity data from structured systems with data from unstructured data targets, organizations can more quickly identify and mitigate risks, spot compliance issues, and make the right decisions when granting or revoking access to sensitive data. Packaged and priced by target storage system, the company's File Access Manager product provides core capabilities, such as data discovery and classification, policy controls, risk remediation, and compliance automation.
SailPoint AI: Proactively provides visibility at speed and scale to determine access needs and potential security breaches associated with risky access policy to optimize security management. The company's SailPoint AI capability is built to provide its IdentityIQ customers with additional AI features, such as recommendations and role discovery, by leveraging elements of the Atlas platform to streamline management.
Technology
The company has invested significant time and effort to remain a pioneer in innovation, continually emphasizing sophisticated and differentiated solutions to provide the best outcome for its customers. The company's team has been highly intentional in its approach to addressing customer needs and has leveraged its extensive knowledge in advanced technology to address these in a differentiated and optimized manner.
Unified Platform
The company's Atlas platform allows customers to manage all types of identities and their access needs across all environments through a single pane of glass, providing the underlying infrastructure critical to powering its Identity Security Cloud. The Atlas platform is the culmination of both years of investment and the expertise of the company's management and technical teams. Taking the lessons learned from its experiences with prior generation identity solutions, the company's engineers and architects designed a modern identity platform with internet scale, comprehensive cloud, hybrid, and customer-hosted environment coverage, and openness to optimize customers’ existing technology investments. This extensible, enterprise-grade platform is critical to enabling the management of not only employees, but also non-employees and machine identities, with varying levels of privilege, spanning cloud platforms such as AWS, GCP, and Microsoft Azure, SaaS applications, customer-hosted applications, and datacenter infrastructure such as servers and databases. Tools, including AI, analytics, workflows, and app onboarding, are embedded throughout the company's unified platform, powering enhanced decision making, differentiated insights, and frictionless automation. The purpose-built platform provides the controls essential to govern and secure digital identities in today’s complex IT environments to support real-time, risk-based, and policy-driven management of the constantly evolving breadth and depth of enterprise identities, ensuring the right identities have access to the right data.
Key features of the Atlas platform include:
Extensibility: Enables deep configuration across security systems, empowering customers to easily thread identity security across their ecosystem.
Personalized insights & reporting: Personalized action-oriented insights and reporting putting the most important identity information at the fingertips of administrators, managers, and end users.
ML: Rich library of ML models designed for better-optimized enterprise identity security practices and improved decision-making.
Connectivity: Expansive library of application and resource connectors that allow organizations to consolidate all access and identity information into a single solution.
Event-driven orchestration: Automated simple and complex identity use cases through custom workflows and forms to reduce or eliminate manual intervention.
Unified Data Model
The Identity Cube is a key element of the company's data layer, providing a 360-degree view on every identity. The Identity Cube provides a complete view of each identity, including attributes, entitlements, access rights, and risk scores. It is extensible by the customer to include data attributes that are relevant specifically to their organizations.
In an on-premise deployment scenario, the Identity Cube is a part of every IdentityIQ installation. As user data and other attributes are aggregated from enterprise HR systems, directories, and the like, the Identity Cube is populated. From there, core life cycle functions such as provisioning new accounts for users can be accomplished. The Identity Cube is an integral part of the product, not an add-on or optional module.
In a customer-hosted deployment scenario, the Identity Cube is also a part of every implementation and functions in the same way. The difference is architectural, with the Identity Security Cloud version of the Identity Cube being optimized for a multi-tenant, cloud-native architecture. In addition, in the SaaS deployment scenario, there are additional data facilities available that, when combined with the Identity Cube, represent the company's unified data model.
In both scenarios, the Identity Cube utilizes insights of the complex dependencies between identities, applications, data, and activities to create specialized data models that understand the effective access of an identity, patterns, and the potential risk level, whether in the cloud or customer-hosted. The connective, scalable, configurable, and automated nature of the company's Identity Security Cloud and IdentityIQ solutions allows it to secure identities for the most complex global organizations across all industries with AI-based security tools that provide comprehensive, scalable, and fast identity security to solve the needs of modern organizations.
The operational data derived from the data layer is organized into structured tables that represent real-world entities and their relationships. SailPoint’s account correlation, orphan account management, and risk scoring capabilities allow security professionals and business managers to track who has access to what and how often they use it and to rectify risky or dated access. With the help of the Identity Cube’s context and the data layer, operational and security systems can make informed decisions about access and perform key remediation and change requests on the company's identity platform via its standardized application program interfaces and software development kits.
Both the company's Identity Security Cloud and IdentityIQ offerings leverage highly advanced technology, AI, and ML to maximize the value received by its customers and streamline their operations to provide a stronger identity security posture. SailPoint recognizes the critical opportunity AI represents to the most scaled and complex enterprise organizations and is committed to partnering with its customers to continue to provide solutions incorporating these advanced technologies to improve identity security at enterprise scale. The company's AI-based solutions process petabytes of data daily and are scalable, adaptable, and cost-efficient and provide customers with enhanced detection, improved accuracy and efficiency, and an enhanced user experience that enable them to make better decisions faster. The company's innovation and experience in this space is demonstrated not only by recently developed products, but by a track record of successful AI-based offerings brought to market over the course of the last several years. Four major areas of capabilities form the company's AI layer as well as several distinct AI-based applications:
Recommendations: The company's intelligent AI-based recommendations streamline account creation, access requests based on user roles and organizational policies, and access certifications. This functionality helps both requestors and approvers make better decisions and ensures access rights are regularly reviewed and validated, significantly reducing organizational risk.
Discovery: The company's discovery capabilities automatically identify and create roles based on the actual access patterns of users, simplifying role creation and identifying access patterns to highlight potential security risks or misconfigurations. Launched in 2020, the company's Access Modeling offering based on the discovery engine significantly reduces the time required to build an organization’s access model, and just as importantly, keep it up to date through role and peer group discovery, low similarity outlier analysis, and common access creation.
Assistant: The company's assistive technologies drive user engagement and seamless experiences with large language models. In 2023, the company launched its generative AI entitlement descriptions, which address one of identity security’s pain points by automatically generating descriptions of application entitlements. Given the significant additional workload associated with description creation, many entitlements across the modern organization remain without a description, increasing the difficulty in determining the validity and necessity of requests or approvals.
Automation: The company's automation capabilities streamline the onboarding of new applications by provisioning access and managing compliance-related activities. This functionality significantly reduces the amount of time required to onboard the long tail of applications onto the identity platform, accelerating ROI, decreasing time to value for customers, and improving security posture at the same time.
The company's AI layer utilizes a combination of open-source models that have been customized for its use cases, proprietary models, and third-party models hosted by third-party subprocessors. The company also incorporates human-in-the-loop into its processes, including with entitlement descriptions, to detect incorrect predictions and improve the model.
Extensibility and Low-Code/No-Code Automation
The company's solutions provide flexible low-code workflows and no-code forms to extend its products. Customers have used the company's interactive drag-and-drop workflows to create processes that are executed millions of times a month to meet the unique needs of their business processes. For customers who need deeper customization, or bespoke integrations with other enterprise systems, the company's offerings provide a robust set of application programming interfaces (APIs) and software development kits (SDKs), supported by a vibrant developer community and Developer Relations team. Customers can browse community-contributed extensions and add them to their existing solution.
Connector Library and Ecosystem
The company's solutions offer connectivity to over 1,100 applications through their extensive connector library. In addition, customers have used this same library to connect to over 20,000 custom applications. The company's solutions leverage AI technology to automatically map application data models to the SailPoint Identity Cube, dramatically reducing the long tail of application integration efforts that typically hinder identity deployments.
Multitenant SaaS Architecture
The company's microservices-based SaaS model, coupled with its low-code/no-code capabilities and its abstracted SDKs means that customers can customize the Identity Security Cloud while always running the latest code—without the need to test new versions or re-implement changes. Competitors who have deployed single-tenant models still require customers to schedule upgrade windows and delay code pushes, which drives total cost of ownership.
Customers
The company has a diverse global customer base with approximately 2,975 organizations in more than 60 countries as of January 31, 2025. The company's customers include leading organizations in a diverse set of industries, including financial services, media, energy and utilities, technology, life sciences, and healthcare, as well as government agencies and public universities, and represent 51% of the Fortune 500 and 26% of the Forbes Global 2000.
Sales and Marketing
Sales
The company sells its solutions primarily through its direct sales organization, which is consisted of field and digital sales personnel, as well as through channel partners. The company's sales force is structured by geography, customer size, status (customer or prospect), and industry verticals, including healthcare, public sector, and government. Each segment is managed by specialized teams equipped with tailored strategies to meet unique customer needs. The sales team focuses on complex, high-value deals, often involving multi-layered decision-making processes. The company services the market through a global sales force, utilizing both direct and indirect selling motions to maximize reach and effectiveness. The company's direct sales teams engage with customers to deliver comprehensive identity security solutions, while its channel partners expand its market presence and provide additional value through localized expertise and support. Multiple routes to market enable the company to effectively penetrate diverse markets and address varying customer needs.
The company's market segmentation strategy is designed to align its selling capacity with the highest-value market opportunities. The company focuses on targeting segments that align with its ideal customer profiles, allowing it to deploy resources efficiently and effectively. This strategic alignment ensures that the company concentrates its efforts on opportunities where its solutions provide the greatest impact, enhancing both customer satisfaction and its sales efficiency.
As part of its selling engagements, the company employs a consultative, playbook-based selling approach that emphasizes understanding the unique value its solutions bring to each customer. The company's sales process includes developing thorough business cases and proofs of value, providing customers with a clear and prescriptive path to successful implementation. This method is supported by overlay resources, including technical specialists who assist in the sales process, ensuring that the company's solutions are presented with the necessary technical depth and clarity.
Marketing
The company's marketing charter is to be a digital-first, data-driven, and customer-obsessed team that relentlessly accelerates its growth and innovation. The company's strategy is focused on the following core areas: driving strong global brand awareness and differentiation for the company, leveraging digital marketing tools to engage potential buyers and create a strong and targeted pipeline for its sales force, and helping its customers accelerate their adoption and success as their trusted partner. The company's data-driven digital approach to marketing is tightly aligned to the needs of its addressable market and provides agility to leverage market opportunities in a targeted and timely fashion.
The company's marketing engine starts with developing a unique value proposition and differentiated messaging for its solutions to drive broad awareness, followed by activating demand and creating pipeline, all the way to accelerating adoption and time-to-value for its customers and driving renewals and advocacy:
The company's awareness and educational efforts focus on brand campaigns, digital and content marketing, public and analyst relations, social media engagement and influencer relations, and thought leadership, such as its annual Horizons of Identity Security Report, market research, blogs, and bylines.
The company's pipeline generation and maturation efforts focus on efficiently engaging targeted accounts and maturing them through their buyer’s journey. The company's programs include digital campaigns and webinars, Account Based Marketing (ABM), virtual/physical events such as Navigate and other conferences, and executive roundtables. The company also works closely with its key partners to extend the reach to a broader spectrum of the targeted accounts and audience that its partners have strong relationships with.
The company's customer engagement efforts include customer onboarding and education communications, customer reference development, executive advisory boards, and community development and engagement.
The company's marketing programs are executed with a combination of centralized global initiatives and regional specific programs tailored to three major geographies: (i) the Americas, (ii) EMEA, and (iii) Asia-Pacific (APAC). The company's typical audience includes IT and security professionals, including Chief Information Officers, Chief Information Security Officers (CISOs), and key identity decision makers, and has recently expanded to include key lines of business decision makers in finance, legal, HR, and accounting, as identity security has become a greater strategic imperative.
Every year, the company hosts its flagship user conference, Navigate, followed by a global conference roadshow to demonstrate its strong commitment to enabling its global customers to succeed, while also serving as an opportunity to create pipeline for new sales to prospective customers and additional sales to existing customers. In an effort to extend its thought leadership in the space, the company also participates in several industry events, including RSA and Black Hat.
Professional Services and Customer Support
Professional Services
The company is focused on ensuring that its professional services partners, who perform most of the implementations for its customers, can implement its solutions successfully by developing and creating best practices. The company provides expert services to partners and customers for complex implementation assistance. In certain cases, the company leads direct customer implementations.
Customer Success Management
The company's customer success strategy centers around its investment in, and ownership of, the post-sale experience for its customers. Every customer and MSP has access to the company's team of Customer Success Managers (CSMs), whose goal is to help customers, and the partners that support them, achieve their desired return on investment and business results. Through proactive and regular engagements, the CSM team endeavors to keep every customer satisfied and help them use their SailPoint products or services optimally. When necessary, the CSM coordinates cross-departmental resources to remove any barrier to success. In addition, the company's customer success team utilizes customer data to identify and present any cross-sell or up-sell solutions aligned to a customer’s business objectives, thereby contributing to revenue expansion and increased product penetration. By proactively managing customer relationships, the CSM team nurtures client advocates, who become a powerful asset in closing new business.
Customer Support
The company's customer support organization includes experienced, trained engineers who provide 24x7x365 support for critical issues. Customers receive contractual response times, telephonic support, and access to online support portals. The company's customer support organization has global capabilities, deep expertise in its solutions, and, through select support partners, is able to deliver support in multiple languages.
Alliances and Strategic Relationships
As a core part of its strategy, the company has cultivated strong relationships with partners to help it increase its reach. The company has developed a large partner network consisting of technology partners, system integrators, value-added resellers, and MSPs. In the year ended January 31, 2025, greater than 90% of the company's new customer transactions involved its partner network.
Technology Partners
The SailPoint Technology Alliance Program is a technology partnering network that leverages familiar standards and methods that make it easy to share identity context and configure identity-specific policies across disparate systems. Program offerings include access to SailPoint SDKs and APIs, developer support, and cloud-based certification services. The program comprises over 120 technology and implementation partners and has produced over 100 certified integrations.
The company has partnered with industry leaders across a spectrum of technologies that enable organizations to integrate their entire security, mobility, cloud, and applications infrastructure into its platform so that breaches can be better identified, mitigated, and contained, and operations can be streamlined. Solutions from companies such as AWS, CyberArk, Proofpoint, SAP, and ServiceNow that are plugged into the company's open identity platform through APIs provide its customers value-added capabilities to build an identity-aware enterprise.
System Integrators
The company partners with many large and global system integrators, including Accenture, Capgemini, Deloitte, KPMG, and PwC, as well as many regional system integrators. The focus of the company's system integrators program is to deliver pipeline growth and bookings, to help partners drive self-sufficiency, and to foster transparency and collaboration through shared assets and resources. The company has implemented joint business controls and metrics that provide a platform for discussion and partnership development and help the company optimize its program and unified value proposition.
Value-Added Resellers
Value-added resellers, such as CDW, GuidePoint, NetBR, Optiv, and Softcat, bring product expertise and implementation best practices to the company's customers globally. They provide vertical expertise and technical advice in addition to reselling or bundling the company's software. Many of the company’s reseller partners have been trained to demonstrate and promote its identity platform. The company's reseller channel ranges from large companies to regional resellers in its markets and territories. The company’s reseller program is designed to scale growth, help generate new opportunities, optimize customer experience, and increase profitability as well as sales efficiency.
Managed Security Service Providers
The company partners with a growing number of MSPs, including Accenture, Simeio, Kommando, and MajorKey, to expand the reach of its direct sales organization. The company's MSP channel augments its reach in market segments and territories. The company's MSP partners offer its solutions, both packaged with a managed service and without.
Competition
The company operates in a highly competitive market characterized by constant change and innovation. The company's competitors include large public companies, such as IBM, Microsoft, and Oracle that offer identity solutions within their product portfolios, and identity-centric solution providers, including CyberArk, Okta, and One Identity.
Intellectual Property
As of January 31, 2025, the company had 79 issued patents and 16 patent applications pending in the United States and eight issued patents and no patent applications pending internationally, in each case relating to certain aspects of its technology. Also as of January 31, 2025, the expiration dates of the company's issued patents ranged from 2025 to 2041.
Research and Development
The company's research and development expense for the year ended January 31, 2025, was approximately $169.7 million.
Government Regulations
In Australia, the company's SailPoint Identity Security Cloud has been assessed to the Information Security Registered Assessors Program’s (IRAP) PROTECTED level control requirements, which are based on controls identified in the Australian Signals Directorate and Australian Government Information Security Manual. This IRAP assessment is a prerequisite for many Australian government departments seeking to adopt platforms and tools from cloud service.
History
SailPoint, Inc. was founded in 2005 and is based in Austin, Texas. The company was incorporated in 2022.