Remediant Blog

Securing Innovation

JD Sherry, CRO, Joins Security Leaders to Discuss Strategies at SecurityWeek CISO Forum in San Francisco

Last week, JD Sherry, Chief Revenue Officer at Remediant, joined top security leaders to discuss, share and learn information security strategies at the SecurityWeek CISO Forum.

Read more

Q&A with Michelle Nguyen, Director of Enterprise Sales at Remediant and Top Woman in Cybersecurity

Michelle Nguyen is Director of Enterprise Sales for Remediant, a San Francisco-based software security startup. She has spent the past 15 years delivering software and IT services to Fortune 100 companies across a number of vertical markets including healthcare, telecommunications, financial services and more.

Read more

Why Remediant is Committed to Improving the Future of PAM

As we seek to enter our next phase of hyper-growth, this $15 million Series A round will fuel continued innovation in our products, continued investment in our people and continued success for our customers.

Read more

What it Means to be a 2019 Gartner Cool Vendor

David Spark, producer and co-host of the CISO/Security Vendor Relationship Series recently sat down with Remediant’s co-founders Tim Keeler and Paul Lanzi. The three discussed Remediant being recognized as a 2019 Gartner Cool Vendor and examined some of the key benefits of using Remediant’s PAM solution SecureONE.

Read more

Why Top Industry Analysts View PAM as a Top Priority for 2019 and Beyond

Privileged access management (PAM) has been around for over 20 years and has been widely adopted by enterprises, but we still hear of data breaches almost every week. How are attackers getting around PAM? The answer is simple: stolen admin credentials.

Read more

The Privileged Access That Was Promised

For avid Game of Thrones fans, Season 8’s third episode brought together a long-awaited clash of the White Walkers versus the living at the Stark's castle in Winterfell. You might be asking yourself, “What does Game of Thrones have to do with privileged access management and data breaches?” We see many parallels. Find out how you can protect your network against the army of insider threats.

Read more

5 Big Benefits the New NIST Cybersecurity Practice Guide SP 1800-18 is Bringing to the Financial Services Industry

The National Cybersecurity Center of Excellence (NCCoE) is just out with a draft of its NIST Special Publication 1800-18 Privileged Account Management for the Financial Services Sector. Remediant was honored to be among the few companies NCCoE tapped to help draft the new guidelines. But the benefits will extend to the entire financial services industry. Let’s take a look at five big reasons this is the case.

Read more

PAM Security Awareness at this year's RSA...and Beyond

Cyber attacks happen all the time. But when it comes to industry scrutiny, the timing couldn’t have been worse for Citrix. Just as pretty much the entire cybersecurity industry was busy meeting at RSA 2019 in San Francisco this month, the digital workspace technology firm announced that its internal Citrix network had been breached. Here’s my 2 cents on how to enhance that focus on the PAM areas most in need of attention and reform.

Read more

Identity Management v/s Access Management: What’s the Difference?

Do you know what the difference between Identity and Access Management is? Here is where the confusion arises. Therefore we have differentiated the difference between identity and access management; let’s have a look on it.

Read more

Challenges & Benefits of Building Multifactor Authentication Solutions

Multifactor authentication (MFA) is a security process that requires more than one method of authentication to ensure the security of your privileged users, but it's not necessarily easy to create. Have a look at some important motivations of those companies that are using multi-factor authentication.

Read more

Older Posts