Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

AI-Powered Application Onboarding in Identity Security

Sailpoint
05/08/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • SailPoint's new application onboarding capability helps customers expand Identity Security Cloud coverage to hundreds or thousands of enterprise applications through a discovery service and AI-powered recommendations.
  • The discovery service provides an active worksheet showing the complete application landscape, tracking onboarded applications and prioritizing the backlog to measure identity coverage progress.
  • AI-powered recommendations accelerate the onboarding process by reducing the subject matter expertise burden and enabling faster, more intelligent decisions at key workflow steps.
  • Future enhancements will infuse AI into additional onboarding steps and enable more participants in the process to scale horizontally across larger application volumes.

Discovery and Application Landscape Visibility

SailPoint's new application onboarding capability addresses a critical industry challenge: helping customers expand Identity Security Cloud coverage across hundreds or thousands of enterprise applications. The feature introduces a discovery service that provides visibility into an organization's complete application landscape, creating an active worksheet that tracks which applications have been onboarded and which remain in the backlog. This discovery capability enables customers to prioritize onboarding efforts, measure progress throughout the identity security lifecycle, and systematically expand their identity coverage. The discovery service remains relevant and effective throughout the entire application lifecycle, providing continuous visibility into identity security posture.

AI-Powered Recommendations for Faster Onboarding

SailPoint has integrated artificial intelligence into specific steps of the application onboarding process to accelerate time to value. The AI-powered recommendations help administrators make intelligent decisions during onboarding, reducing the subject matter expertise burden that traditionally slows down the process. Each application has unique nuances that require specialized knowledge, and when dealing with large volumes of applications, this expertise requirement becomes a significant bottleneck. By leveraging AI to provide intelligent recommendations at key decision points, SailPoint reduces administrative burden and enables faster, more confident onboarding decisions. The company plans to expand AI capabilities to additional steps in the onboarding workflow and enable more subject matter experts to participate in the process, allowing horizontal scaling to handle larger application volumes.

Chapters

0:00 - Introduction and Guest Welcome
0:37 - Application Onboarding Capability Overview
2:12 - Industry Challenges in Application Onboarding
3:44 - Customer Feedback and Discovery Service
4:44 - AI-Powered Recommendations
6:12 - Future Roadmap and Closing

Key Quotes

1:21 "... even our largest, most mature customers are looking to increase the number of applications by hundreds and, in some cases, thousands ..."
1:35 "The process of onboarding applications industry-wide is understood to be a challenge, and our customers are looking for us to help them to address that challenge ..."
3:28 "... what we've been looking to do here is to focus on how artificial intelligence and data can help us to reduce that burden and accelerate the onboarding process ..."
5:43 "... the goal here is to leverage AI to accelerate intelligent decisions within the process, which translate to quicker time to value for our customers ..."

Categories:
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • AI & Machine Learning
  • Technical Deep Dive
  • Getting Started
  • Application Onboarding
  • Identity Security Cloud
  • Discovery Service
  • AI-Powered Recommendations
  • Identity Coverage
  • Enterprise Application Management
  • Identity Governance
  • Time to Value
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: AI-Powered Application Onboarding in Identity Security

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version