SSH.COM Blog

Zero Trust just-in-time remote work

Make remote work fast & secure for admins, devs an...

For obvious reasons, a vast majority of your system administrators, DevOps teams and software engineers are forced to adopt remote work habits right now. They are called privileged users for a reason, since they access to business-critical databases and maintain IT infrastructures. But are security controls under threat now that this shift was so sudden? Here are five ways how companies can ensure...

Zero Trust just-in-time

PrivX: the passwordless and partly patented PAM

A few days ago, we announced that The United States Patent and Trademarks Office (USPTO) has granted SSH.COM a patent (US10523445), which covers secure passwordless access to hosts in hybrid networks comprising on-premise and cloud resources. This technology is used in our lean privileged access management (PAM) solution called PrivX. We believe in passwordless IT infrastructures As IT workloads m...

identity and access management partners Privileged Access Management

SSH.COM and Digital Information Technologies Form ...

The partnership will help enterprises mitigate the risks of privileged credential abuse and streamline operations as they move to multi-cloud environments.

Zero Trust just-in-time

Cool PAM with great auditing features and easy acc...

2019 has been an exciting year for privileged access management (PAM): we’ve seen the rise of the Zero Trust framework, recommendations from Gartner analysts towards Just-In-Time (JIT) and Zero Standing Privileges (ZSP) models and our very own lean PAM - PrivX, has steadily evolved to accelerate the industry’s transition to JIT access. Since introducing PrivX in 2018, our aim has been to develop a...

cybersecurity cloud security Zero Trust

5 must-haves for future-proof, multi-cloud privile...

Cloud environments today require modern tools for cloud access management. Traditional PAMs, while useful for enterprises’ on-prem environments, have some limitations where cloud is involved however. Fast-moving cloud teams require elasticity and scalability that modern access management tools can provide. One Fortune 500 company, for example, needed more agility in order to meet their growing dem...

cybersecurity cloud security Zero Trust

Where are you now on your zero trust journey?

Every company has different cybersecurity priorities, but top-level trends tend to bubble up to the top among all organizations. The stage these organizations are at in those trends is what varies from company to company. Some organizations are at the cutting edge of their cybersecurity with the need to protect not just massive amounts of money for financial industries, but also personally identif...

cybersecurity cloud security cloudification

In Defense of the “Dumb User” – Are Security Solut...

Despite the best efforts of security providers and users, data breaches continue to proliferate, with 4.1 billion records exposed in data breaches in the first half of 2019 alone. And each time there’s a breach, we go through the same process of trying to figure out who’s to blame. Was it an IT admin, who configured a piece of software incorrectly? Was it a user, who clicked on a link they shouldn...

cloudification PrivX customer

Three tips for managing admin access to your cloud...

As companies’ workloads increasingly move to the cloud, new security concerns arise. Chief among these is making sure your company is prepared to manage access to the sensitive data that resides in the cloud. Traditional privileged access management solutions (PAM) are expensive, and they’re too slow for onboarding and offboarding in multi-cloud environments. Instead, companies need a lean, scalab...

Gartner PAM just-in-time

Gartner: standing privileges in IT are a risk

How many years has the cybersecurity industry talked about “the password problem”? And how many years has the conclusion always been the same: passwords are one of the weakest links in the cybersecurity chain. They are always either too simple, stolen or lost. Or they become too complex to remember. But everybody has to use them. Right? Think again. We can’t claim to be able to eliminate all the p...

cloudification PrivX customer

What software deployment and maintenance looks lik...

When we talk about simplifying access management tools, we tend to focus a lot on the end user. Developers, for example, often bypass the bulky and hard-to-use privileged access management (PAM) solutions their organization has put in place to secure access to servers and other valuable assets, mainly because they’re interested in working faster. But they’re not the only ones with a need for speed...

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog