Menu
Contact Us
Get a Demo
Blog-hero

Remediant Blog

Stay up to date with thought-leading expertise

by Remediant, on Oct 16, 2018

To all but a small percentage of people, there is no real difference between identity management and access management because very few people need to understand the distinctions. Or at least, they don’t realize that they need to understand how the two concepts are dissimilar. They are related, but decidedly …

Read Story

by Remediant, on Oct 16, 2018

It’s not often that Amazon is late to any game. Consistently cited as the leader – quite often defining the cutting edge – of supply chain and delivery logistics, e-reading technology, DRM-free digital music distribution and countless other technologies, there is one crucial technology that Amazon was late to adopting: …

Read Story
Topics:SecureONE

by Admin, on Oct 07, 2018

CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market, today announced that Remediant’s SecureONE platform has been named the winner of the “Privileged Access Management Solution of the Year” award from CyberSecurity Breakthrough. “As we kick off CyberSecurity Awareness month, it …

Read Story
Topics:Zero Standing Privilege

by Admin, on Sep 18, 2018

Remediant, a provider of Just-In-Time Administration (JITA) technology, today announced that analyst firm Enterprise Management Associates (EMA) has named the company as a top solution provider for enabling privileged access management (PAM) in its recent EMA Top 3 Report: Ten Priorities for Enabling Secure Access to Enterprise IT Services. This EMA report …

Read Story
Topics:Privileged Access Management (PAM)

by Admin, on Apr 15, 2018

Remediant today announced participation in Optiv Security’s, partner program. Remediant brings a new level of control and insight over the distribution, usage, and protection of privileged access in enterprise environments using its SecureONE platform. Privileged access is not only the #1 attack vector in security breaches, it’s also a critical part …

Read Story
Topics:Zero Standing Privilege

by Paul Lanzi, on Jul 21, 2017

Tim Keeler interviewed by Patrick Gray / Risky.biz podcast Earlier this week, our own Tim Keeler had a chance to chat with Patrick Gray, host of the award-winning podcast Risky Business https://risky.biz. Here are a few key excerpts from the interview: Patrick Gray: We all know that privileged access management is …

Read Story

by Tim Keeler, on May 18, 2017

Calling All Cyber Unicorns… In light of the recent events with the latest global outbreak of ransomware spreading across the digital globe, I wanted to take a few moments and acknowledge the tremendous amount of effort going on within all organizations currently impacted with this outbreak. Having been involved in …

Read Story

by Paul Lanzi, on Jan 30, 2017

Can’t Hire? Higher Automation. Cybersecurity staffing faces a crisis today. There are two jobs for every qualified person, according to IBM’s Security Intelligence. Current educational institutions can’t train people fast enough to meet the demand, and this problem is likely going to get worse. Businesses don’t have the option of going …

Read Story

Looking for more ways to stay up to date?

Follow us on social

Subscribe to Updates