Browsed by
Author: Martin Cannard

Martin is Vice President of Product Strategy at STEALTHbits. Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space.  Prior to STEALTHbits, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec.  He is a recognized expert and a regular speaker for security events and webinars.
Reduce PAM Switching Costs With Bring-Your-Own-Vault – Leverage Your Existing Password Vault

Reduce PAM Switching Costs With Bring-Your-Own-Vault – Leverage Your Existing Password Vault

Why Do Many PAM Deployments Fail or Fall Short of Expectations? Complexity and optimism of scalability. Fail may be too strong of a word, maybe “don’t reach their full potential” is a better way to describe most Privileged Access Management (PAM) projects. They start off complex between vaults, modules, configurations, redefining roles, collapsing access, and more often lasting 6-9 months if lucky, longer if not. Once PAM solutions get implemented, use cases start to grow and pop-up over time. From…

Read More Read More

Protip: How to Use the STEALTHbits Privileged Activity Manager for Delegated Access to Active Directory

Protip: How to Use the STEALTHbits Privileged Activity Manager for Delegated Access to Active Directory

Oftentimes, helpdesk operators are given access to accounts with privileges covering a broad range of tasks. A better approach is to apply delegated permissions for the specific task in hand, and then to remove those privileges once the action has been completed. STEALTHbits Privileged Activity Manager (SbPAM) can allow AD rights to be dynamically added to a helpdesk operator account at the point it is required. To do this you will need to create a new Activity. Step 1) Create…

Read More Read More

The Problem with PAM: Implementing Privileged Access Management Without the Pain

The Problem with PAM: Implementing Privileged Access Management Without the Pain

What Does PAM Mean To You? The term is not as straightforward as most people think… it has evolved over the years in parallel with the ever-changing security landscape. Take any combination of password management, least privilege, and session management, then throw in a smattering of role-based directory groups and you’ve kinda got it. The key misunderstanding though is that a PAM solution must come wrapped around a password vault. This is not to say that password vaults are not…

Read More Read More

Start a Free Stealthbits Trial!

No risk. No obligation.