REMEDIANT IS NOW PART OF NETWRIX  READ PRESS RELEASE

Blog
Get a Demo
Contact Us
Get a Demo
Menu
Contact Us
Blog
Get a Demo
Blog-hero

Remediant Blog

Stay up to date with thought-leading expertise

by Paul Lanzi, on Mar 01, 2022

To set the stage, we need to way back – to Pakistan in 1986. A computer store in Lahore played host to the creation of the first PC computer virus: Brain. Two brothers who ran the computer store created the Brain boot sector virus to discourage people who were illegally …

Read Story

by Raj Dodhiawala, on Jan 20, 2022

Remediant had a breakthrough 2021. The year was highlighted by measurable growth in subscription ARR, an enviable net customer retention rate, several industry-first product innovations and the Honorable Mention in the Gartner Magic Quadrant for PAM. New Customers: Our New Subscription ARR grew by 100% over the previous year. More …

Read Story

by Raj Dodhiawala, on Jan 05, 2022

Modeling Privilege Access Sprawl for Zero Trust Security A privilege sprawl occurs when privileges, or special rights to a system, have been granted to too many people. It’s a best-case scenario for cyberattackers. When privilege sprawl gets out of hand, an organization’s attack surface grows and becomes a pain point …

Read Story

by Sam Kumarsamy, on Sep 13, 2021

With summer behind us, I couldn’t be more thrilled than to announce the release of our v2.12 SecureONE platform update. With this month's release, Remediant leads the industry in providing Privileged Access Risk dashboards for executives and security practitioners. These dashboards help organizations to visualize, analyze, and reduce their privileged …

Read Story

by Sam Kumarsamy, on Jul 26, 2021

We at Remediant are thrilled to be included as an honorable mention in the 2021 Gartner Magic Quadrant for Privileged Access Management report. According to the report, “Gartner defines the privileged access management (PAM) market as a foundational security technology to protect accounts, credentials and operations that offer an elevated (“privileged”) …

Read Story

by Kevin Garrett, on Jul 20, 2021

Let’s be real. If you’ve worked in cybersecurity for more than a few minutes, you know that magical silver bullets just don’t exist for stopping breaches or lateral movement. We face a complex landscape. Holes and vulnerabilities—both known and unknown—riddle the ecosystems where we operate. We confront problems that are …

Read Story
Topics:SecureONEZero Standing PrivilegeRansomware

by Tim Keeler, on Jun 05, 2021

We’ve all watched those movies … the ones with the eye-rolling assumptions that film writers and directors sometimes make about IT security. They show hackers in a dark room, their faces dimly lit by their monitors. They type plain-English commands onto a dark computer screen, stare intently at their work, …

Read Story
Topics:Privileged Access Management (PAM)

by Sam Kumarsamy, on May 27, 2021

Privileged user accounts have elevated privileges such as Domain Administrator rights or root privileges. PAM solutions were developed to monitor and record privileged user account activity or sessions. They monitor this privileged access to network devices such as Windows, Linux and Macs. These PAM solutions help organizations meet audit and compliance …

Read Story
Topics:SecureONE

Looking for more ways to stay up to date?

Follow us on social

Subscribe to Updates