Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

How Teleport Delivers Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure

While SSH has always been a popular attack vector, the increased adoption of elastic, cloud infrastructure and dynamic, micro-service architecture using containerized application services (aka, "cloud-native" applications), has resulted in the additional complexity of having application services that can migrate across dynamic server infrastructure. This makes managing access to applications and their infrastructure through SSH more complicated and more prone to security threats.

The US National Security Agency's best practices for cloud security.

To address the confusion surrounding cloud technology, the US National Security Agency (NSA) has published a guide explaining cloud technology and its vulnerabilities. We've made things easier by preparing a guide that gives you the best practices to fix these vulnerabilities, and keep your cloud environment secure.

Teleport vs AWS Session Manager

In this paper, we will provide a brief description of what SSM Session Manager is and how it compares to Gravitational's Teleport privileged access management solution. We'll compare the significant design and feature differences and the operational overhead of the solutions. Because Session Manager is limited to AWS, we'll limit the scope of the discussion to that cloud provider. Finally, we have provided a feature matrix of the two solutions.

INETCO Insight - Machine Learning and Risk Scoring for Real-time Payment Fraud Detection and Prevention

With The Nilson Report projecting $34.66 billion in global fraud losses by 2022, it is clear that crime syndicates are investing heavily in finding new and more advanced ways of countering the controls organizations are constantly implementing. Financial institutions, retailers, card service providers and acquiring processors are struggling to detect suspicious payment transaction behavior and prevent payment fraud attacks before experiencing major financial loss and customer dissatisfaction.