Blog

01/04/2020
Responding to COVID-19 - How Automating IT Tasks Can Help

I won’t take your valuable time to echo back your problems. You already know what they are. Everyone is feeling the same kinds of pressure. I reached out to several of our customers and asked, “how can we help?” and I was told, “you already are.” I was a bit surprised. One customer with approximately […]

Read More
28/01/2020
Three Steps to Achieving Zero Trust Security by Eliminating Elevated Privileges

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. Zero Trust must go further than identifying the person. If the fundamental tenet is that we should […]

Read More
27/01/2020
What is Privileged Task Management (PTM)?

Privileged Task Management is the next generation of Privileged Access Management (PAM) technology. What is PAM? If you haven't heard of PAM, it refers to security processes and technologies to control elevated (“privileged”) access (i.e. Administrator accounts). This is usually accomplished by putting the privileged credentials inside a secure repository (a vault). This has the […]

Read More
08/01/2020
Using PowerShell - What are the Security Repercussions

In my role as CEO of UC Clearly, I talk with a lot IT operations folks about automation. In those conversations, I hear about, and see a lot of people doing unsafe things with privileged credentials. I also talk with a lot of CSO's and many say they have it under control and aren't curious […]

Read More
arrow-circle-up