Best of both worlds: automated cloud access management and incident response

Cloud adoption has done a lot of good for businesses in driving innovation, agility, and scale. But as organizations adopt cloud services into their IT infrastructure, their security teams are...

Read More

Introducing: native integration with AWS tags for SSH access management

A recent discussion with a customer running its environment on AWS went like this: “I have a very dynamic environment where I can dynamically create and teardown hundreds of servers in minutes and...

Read More

Zero Day protection of SSH Servers with Zero Trust Access

On October 17th, Peter Winter-Smith of NCC Group disclosed a vulnerability in a popular implementation of SSH protocol – libssh.


The vulnerability originated from a specific...

Read More