New Gartner Research Discusses Why Enterprises Should Leverage Just-in-Time Approach for Administrative Access
We’re excited to announce that Gartner has mentioned the Remediant SecureONE platform and unique Just-in-Time Administration (JITA) approach to managing privileged access in a new report, 'Remove Standing Privileges Through a Just-In-Time PAM Approach.'
JD Sherry, CRO, Joins Security Leaders to Discuss Strategies at SecurityWeek CISO Forum in San Francisco
Last week, JD Sherry, Chief Revenue Officer at Remediant, joined top security leaders to discuss, share and learn information security strategies at the SecurityWeek CISO Forum.
Q&A with Michelle Nguyen, Director of Enterprise Sales at Remediant and Top Woman in Cybersecurity
Michelle Nguyen is Director of Enterprise Sales for Remediant, a San Francisco-based software security startup. She has spent the past 15 years delivering software and IT services to Fortune 100 companies across a number of vertical markets including healthcare, telecommunications, financial services and more.
Why Remediant is Committed to Improving the Future of PAM
As we seek to enter our next phase of hyper-growth, this $15 million Series A round will fuel continued innovation in our products, continued investment in our people and continued success for our customers.
What it Means to be a 2019 Gartner Cool Vendor
David Spark, producer and co-host of the CISO/Security Vendor Relationship Series recently sat down with Remediant’s co-founders Tim Keeler and Paul Lanzi. The three discussed Remediant being recognized as a 2019 Gartner Cool Vendor and examined some of the key benefits of using Remediant’s PAM solution SecureONE.
Why Top Industry Analysts View PAM as a Top Priority for 2019 and Beyond
Privileged access management (PAM) has been around for over 20 years and has been widely adopted by enterprises, but we still hear of data breaches almost every week. How are attackers getting around PAM? The answer is simple: stolen admin credentials.
The Privileged Access That Was Promised
For avid Game of Thrones fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark's castle in Winterfell. You might be asking yourself, “What does Game of Thrones have to do with privileged access management and data breaches?” We see many parallels. Find out how you can protect your network against the army of insider threats.
5 Big Benefits the New NIST Cybersecurity Practice Guide SP 1800-18 is Bringing to the Financial Services Industry
The National Cybersecurity Center of Excellence (NCCoE) is just out with a draft of its NIST Special Publication 1800-18 Privileged Account Management for the Financial Services Sector. Remediant was honored to be among the few companies NCCoE tapped to help draft the new guidelines. But the benefits will extend to the entire financial services industry. Let’s take a look at five big reasons this is the case.
PAM Security Awareness at this year's RSA...and Beyond
Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had been breached. Here’s my 2 cents on how to enhance that focus on the PAM areas most in need of attention and reform.
Identity Management v/s Access Management: What’s the Difference?
Do you know what the difference between Identity and Access Management is? Here is where the confusion arises. Therefore we have differentiated the difference between identity and access management; let’s have a look on it.