by JD Sherry, on Feb 10, 2021
When I’m out in the field and Privileged Access Management (PAM) comes up, I usually see that people fall into one of three camps: People who now want a PAM …
Read Storyby JD Sherry, on Dec 03, 2020
The concept behind Zero Trust is simple. When you’re designing security, as Forrester alum and concept founder John Kindervag says, “never trust, always verify.” In practice, that means giving users …
Read Storyby Mahesh Babu, on Sep 09, 2020
Just-in-time administration (JIT) is a now prevalent capability in PAM solutions. Once an emerging, niche feature set, this has now propelled into a table-stakes capability for PAM vendors offered as …
Read Storyby Mahesh Babu, on May 12, 2020
If we agree that standing privilege is defined as that accounts have persistent privilege access for all time on some set of systems. Zero standing privilege is the exact opposite …
Read Storyby Mahesh Babu, on May 06, 2020
Usability ensures more deployment of a security tool, adoption by those the security tool is trying to protect and usage by the security teams administering the tool. This, in turn, …
Read Storyby Mahesh Babu, on May 05, 2020
The credential has become a commodity that will be breached. 74% of breached organizations admitted the breach involved access to a privileged account. In addition, The Verizon Data Breach Investigations Report …
Read Storyby Mahesh Babu, on May 01, 2020
Recent public health concerns aside, teams are becoming more and more distributed as a way to access a broader talent pool, drive down fixed costs and improve employee retention. Gartner …
Read Storyby Mahesh Babu, on Mar 12, 2020
With rapid innovation comes the rapid scaling and adoption of infrastructure. To fuel this innovation, the number of privileged users (on-call developers, admins, SREs) is growing and evolving constantly. With …
Read Story