Jim Cramer Recently Looked At These 16 Stocks

Page 5 of 15

11. SailPoint, Inc. (NASDAQ:SAIL)

Number of Hedge Fund Holders: 25

SailPoint, Inc. (NASDAQ:SAIL) is one of the stocks Jim Cramer recently looked at. Answering a caller’s query about the stock during the lightning round, Cramer stated:

“No, you know, that’s the kind of enterprise software that I just can’t tolerate right now. I just do not want to be in anything like that. The only one that my Charitable Trust is in is Salesforce, and even there, it’s, they punish you every day on the darn thing. So let’s steer clear…”

SailPoint, Inc. (NASDAQ:SAIL) provides security software that helps organizations manage and protect the digital identities of their employees, contractors, and automated systems. NZS Capital, LLC stated the following regarding SailPoint, Inc. (NASDAQ:SAIL) in its third quarter 2025 investor letter:

“SailPoint, Inc. (NASDAQ:SAIL): Earlier this year, researchers discovered a zero-click vulnerability, “EchoLeak”, in Microsoft 365 Copilot, which represented the first known zero-click attack on an AI agent. In this vulnerability, an attacker could send a seemingly normal email containing hidden instructions that the AI assistant would process when the user later asked Copilot a question about said email, resulting in the user unknowingly exfiltrating sensitive data to the attacker’s server. Thus began the AI era of cybersecurity, where AI agents are just as vulnerable to attacks as workplace employees.

SailPoint is a pioneer in identity governance and administration (IGA), which involves managing and securing dynamic access to critical applications and data for every enterprise identity. This capability requires deep, broad controls for proper access authorization, automating functions like account provisioning, and access certification across all identities. Identity governance is essential for operationalizing zero-trust security by helping companies achieve dynamic real time security and prevent people from maintaining permanent, exploitable, high-level permissions and access…” (Click here to read the full text)

Page 5 of 15