Get a Demo
Contact Us
Get a Demo
Contact Us
Get a Demo

Remediant Blog

Stay up to date with thought leading expertise

Remediant Named a 2019 Gartner Cool Vendor

by Remediant, on May 19, 2019

Remediant, Inc., a leading provider of Privileged Access Management (PAM) software, today announced that it has been named a Gartner Cool Vendor. This annual report recognizes interesting, new and innovative vendors, products and services.

To us, it is a great honor to be named a Gartner Cool Vendor,” said Tim Keeler, CEO and Co-founder of Remediant. “Credential attacks are the number one attack vector today and it’s clear that legacy PAM solutions aren’t able to stop the lateral movement of cyber criminals. We built our SecureONE platform in a completely unique way — to only give IT administrators the exact access they need, at just the right time, to protect organizations from data theft via stolen credentials. In this way, we’re providing our customers with much stronger access controls and better overall identity management.”

Since 1996, every PAM solution on the market has been built on top of the concept of a password vault. Remediant’s founders Tim Keeler and Paul Lanzi developed SecureONE as the first PAM solution to bring the ease of an agent-less and vault-less approach, while also delivering continuous detection of new privileged access across the enterprise.

SecureONE approaches privileged access differently than any other PAM solution on the market. It has been adopted by major enterprises across a number of industries, protecting more than 500,000 endpoints. With the ability to scan more than 100,000 hosts in minutes and provide customers with near real-time insight, SecureONE has reduced the quantity of privileged access across the enterprise by more than 99 percent. Ultimately, this reduces an organization’s attack surface and minimizes the impact even if administrator credentials are stolen through attacks like phishing, Pass-the-Hash or Golden Ticket forgery.

According to the report, “Security and risk leaders should review the approach Remediant is taking for JIT privileged access and weigh the scope of control provided by the Remediant platform against their overall privileged access risk to understand what value might be provided by Remediant in their environment. Leaders at organizations using traditional PAM tools without a privilege elevation, (PEDM) PAM component should analyze the capabilities of Remediant to migrate Windows, Mac OS X and Linux-based standing privileges to a more dynamic just in time approach.”

We believe that Gartner’s recognition of Remediant as a Cool Vendor is well deserved,” said Tom Kellermann, Chief Cybersecurity Officer at Carbon Black, Inc. and Advisory Board member for Remediant. “Stealing administrator credentials is the number one goal of attackers and gives the adversary the keys to the kingdom. Remediant’s SecureONE platform dramatically reduces the attack surface and is a game changer for progressive organizations who realize that legacy PAM tools are no longer adequate for identity protection. The digital insider threat is here to stay. SecureONE was custom built to suppress digital insiders.”


You can download a complimentary copy of Gartner’s Cool Vendor report here:

Gartner Cool Vendors in Identity and Access Management, Felix Gaehtgens, Mary Ruddy, David Mahdi, Paul Rabinovich, Michael Kelley, Ant Allan, 10 May 2019

Gartner Disclaimer:

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Remediant

Founded in the heart of San Francisco, Remediant leads with innovation, delivering enterprise-class cybersecurity solutions that enable real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the #1 attack vector across all breaches. To learn more, please visit:

Topics:Privileged Access Management (PAM)

Looking for more ways to stay up to date?

Follow us on social

Subscribe to Updates