<img src="https://ws.zoominfo.com/pixel/MV6YaTmY9SU4BcTgpSBP" width="1" height="1" style="display: none;">

Usability in Security Products

By Mahesh Babu May 06, 2020

Usability ensures more deployment of a security tool, adoption by those the security tool is trying to protect and usage by the security teams administering the tool. This, in turn, ensures more...
Continue Reading

Who (really) has access to your work laptop?

By Mahesh Babu May 05, 2020

The credential has become a commodity that will be breached. 74% of breached organizations admitted the breach involved access to a privileged account. In addition, The Verizon Data Breach...
Continue Reading

Three Tips for Managing Privileged Access in Remote Work Environments

By Mahesh Babu May 01, 2020

Recent public health concerns aside, teams are becoming more and more distributed as a way to access a broader talent pool, drive down fixed costs and improve employee retention. Gartner predicted...
Continue Reading

Five Reasons PAM Implementations Fail

By Mahesh Babu March 12, 2020

With rapid innovation comes the rapid scaling and adoption of infrastructure. To fuel this innovation, the number of privileged users (on-call developers, admins, SREs) is growing and evolving...
Continue Reading