Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Keeper Security in the 2022 Gartner Magic Quadrant for Privileged Access Management

We are proud to share that Keeper Security is highlighted in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM).1 Gartner evaluated eleven PAM vendors for 2022. Keeper’s inclusion acknowledges the team’s success since launching key PAM components such as Connection Manager, Secrets Manager and Password Manager, elevating our platform beyond a password manager.

Stories from the SOC - Credential compromise and the importance of MFA

User account credentials are both a necessary component of normal operations and a critical vector for a malicious actor’s entrance into an enterprise environment. Compensating for the inherent risk of granting the end user access to corporate systems is a challenge in balancing usability with security. When a user with low-level privileges can have their credentials abused to gain increased levels of access, superior solutions to standard username-and-password schemes become necessary.

Security Benefits of Identity and Access Management (IAM)

Identity and Access Management or Identity Access Management (IAM) is a critical security function for organizations of all sizes for privileged access management. By managing access to systems and data, IAM can help mitigate the risk of information breaches and protect the organization's most valuable assets through IAM technologies.

Why I Migrated from ZTNA 1.0 to Modern Day ZTNA

In 2017 Gartner unveiled a new acronym “ZTNA” short for zero trust network access, and released the Market Guide for Zero Trust Network Access. Revolutionary, especially compared to its incumbent technologies like VPN, ZTNA solution quickly became a new form of remote access that was designed to replace traditional remote access technologies and all the risks they came with.

"Five People That Should Make Up Your Modern Day ZTNA Tiger Team"

As a kid who grew up on a steady diet of network TV in the 80s, I always got excited when a crossover was teased at the end of an episode. Take the original Magnum PI starring Tom Selleck. There were several. Magnum and Hawaii Five-O… classic. Simon and Simon on the case with Higgins and Thomas Magnum in 1982, that was a good one! And who could not forget Jessica Fletcher (Angela Lansbury) using her detective skills in episode ‘Novel Connection’!

5 Steps for Building an Agile Identity and Access Management Strategy

Traditional identity and access management (IAM) implementation methods can’t provide enough flexibility, responsiveness, and efficiency. Indeed, many organizations struggle with developing a mature IAM program according to the State of Enterprise Identity report by the Ponemon Institute. Among the key reasons for this challenge cited by respondents in the report are a lack of employee awareness, an insufficient budget, and ineffective planning.

ZTNA, It's Not Just a Remote Access Thing Anymore...

Over the past 28 months, two significant events happened which will change the way we build our IT networks. First, obviously, the pandemic. March 2020 caused the workers of the world to move their office cubes to their basements, bedrooms or even the family kitchen table. Remote work became essential for the economy to function. To facilitate access, we saw mass adoption of Zero Trust Network Access (ZTNA) technologies which do not require heritage based solutions like IPSec VPNs.