I won’t take your valuable time to echo back your problems. You already know what they are. Everyone is feeling the same kinds of pressure. I reached out to several of our customers and asked, “how can we help?” and I was told, “you already are.” I was a bit surprised. One customer with approximately […]
Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. Zero Trust must go further than identifying the person. If the fundamental tenet is that we should […]
Privileged Task Management is the next generation of Privileged Access Management (PAM) technology. What is PAM? If you haven't heard of PAM, it refers to security processes and technologies to control elevated (“privileged”) access (i.e. Administrator accounts). This is usually accomplished by putting the privileged credentials inside a secure repository (a vault). This has the […]
In my role as CEO of UC Clearly, I talk with a lot IT operations folks about automation. In those conversations, I hear about, and see a lot of people doing unsafe things with privileged credentials. I also talk with a lot of CSO's and many say they have it under control and aren't curious […]