Blog

28/01/2020
Three Steps to Achieving Zero Trust Security by Eliminating Elevated Privileges

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. Zero Trust must go further than identifying the person. If the fundamental tenet is that we should […]

Read More
27/01/2020
What is Privileged Task Management (PTM)?

Privileged Task Management is the next generation of Privileged Access Management (PAM) technology. What is PAM? If you haven't heard of PAM, it refers to security processes and technologies to control elevated (“privileged”) access (i.e. Administrator accounts). This is usually accomplished by putting the privileged credentials inside a secure repository (a vault). This has the […]

Read More
08/01/2020
Using PowerShell - What are the Security Repercussions

In my role as CEO of UC Clearly, I talk with a lot IT operations folks about automation. In those conversations, I hear about, and see a lot of people doing unsafe things with privileged credentials. I also talk with a lot of CSO's and many say they have it under control and aren't curious […]

Read More
arrow-circle-up