• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Remediant wants to move beyond PAM to secure enterprise networks

flyytech by flyytech
September 1, 2022
Home Security
Share on FacebookShare on Twitter


Security software provider Remediant wants to move beyond basic privileged access management (PAM) to help CSOs secure enterprise networks.

It’s adopting a new approach it calls PAM+, aimed at helping enterprises protecting access to their systems and build on Zero Trust initiatives.

Tim Keeler, CTO and co-founder of Remediant, set out the need for the new strategy: “Organizations’ inability to properly manage identities and privileges across the enterprise has left a large number of attack surfaces unprotected and vulnerable to cyberattacks that result in ransomware. A majority of today’s cybercriminals are able to accomplish their mission by leveraging privilege (or admin) account sprawl — a very large and highly exploited attack surface.” 

Nearly 80% of today’s cyberattacks involve leveraging privileged identities, he said.

Remediant has been working on PAM+ with its agentless SecureONE product. It said it has doubled its deployments of SecureOne over the last twelve months, with 75% of these deployments delivering on functionality promised by legacy PAM vendors that were never met. 

Keeler said Remediant’s PAM+ strategy was created to help negate password and other credential-based compromises, protect access and accelerate Zero Trust initiatives. “PAM+, as well as SecureONE, goes beyond legacy PAM approaches to address these risks — regardless of size, architecture model or vendor ecosystem. It also maintains a Zero Standing Privilege (ZSP),” he said. 

Zero Standing Privilege

ZSP, a term coined by Gartner, removes the typical, 24×7 admin authorization and protects admin authorization and organizations against the discovery of admin credentials, hashes or secrets from inside the network, even if the attacker has gained a foothold with weak passwords. 

“ZSP protects organizations by reducing the attack surface and is the most critical and proactive cybersecurity measure an organization can do to mitigate threats,” said Keeler. 

Remediant said its newly launched PAM+ strategy offers six capabilities that differentiate it from legacy PAM. It does away with the always-on, always-available privilege access, eliminates the impact of compromised admin credentials, renders password-stealing malware ineffective, routes all administrative access with multi-factor authentication, radically improves IAM/PAM program maturity by protecting access, and delivers rapid time-to-value: agentless, with integration into IT and security workflows, the company said. 

“Privilege sprawl and credential misuse is a factor in nearly every cyberattack, so much so that both are being specifically identified as reasons for rapidly increasing cyber insurance premiums,” Raj Dodhiawala, president and CEO of Remediant, said in the statement. 

“The innovative PAM+ strategy promises to disrupt the stagnant PAM solutions market and truly solve today’s operational and cybersecurity pains. Remediant is laser-focused on protecting access, thereby preventing lateral movement for every customer — regardless of size, architecture model or vendor ecosystem,” the recently promoted CEO added. 

Increasing lateral movement attacks

In lateral movement attacks, once an attacker is inside any infrastructure or system, they elevate privileges and move laterally to find the organization’s crown jewels (for example, the active directory, where all credentials are stored). Once this is done, attackers can encrypt data, execute a ransomware attack and much more.

According to the Global Incident Response Threat Report by VMware, 25% of respondents witnessed instances of lateral movement in the past year. One in every 10 respondents reported that lateral movement was present in more than half of their engagements. Telemetry from Threat intelligence cloud VMware Contexa found that in April and May of this year, almost half of all intrusions included a lateral movement event.

Copyright © 2022 IDG Communications, Inc.



Source_link

flyytech

flyytech

Next Post
Protection of children now in sights of Congress, FTC, tech firms

Protection of children now in sights of Congress, FTC, tech firms

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Announcing Secure Baseline accelerators for multi-tenant App Service deployments

Announcing Secure Baseline accelerators for multi-tenant App Service deployments

March 20, 2023
In the Studio with Tool and “Evil” Joe Barresi

In the Studio with Tool and “Evil” Joe Barresi

February 9, 2023

Trending.

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
How to View Ring Doorbell on a Roku TV

How to View Ring Doorbell on a Roku TV

December 20, 2022
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

A touch of genius with a bright future

A touch of genius with a bright future

March 22, 2023
Top 5: Stephen Street

Top 5: Stephen Street

March 22, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT