Blog

BSI Grundschutz (IT-Baseline Protection) and PAM

BSI Grundschutz (IT-Baseline Protection) and PAM

You have possibly heard of BSI Grundschutz or BSI standards in Germany, let’s get a closer look at the relation between BSI Grundschutz and Privileged Access Management (PAM).

Jun 01, 2021 Read More→
Decentralized Privileged Access Management PAM Benefits and Challenges

Decentralized Privileged Access Management (PAM) Benefits and Challenges: Keeping Edge-to-Cloud Organizations Secure

Discover how to keep your organization safe from the edge to cloud with our article where we list the advantages and challenges of Decentralized Privileged Access Management.

May 25, 2021 Read More→
Reducing Risks in Root Access for Superusers Krontech

Reducing Risks in Root Access for Superusers

In this article, we examine the details of Privileged Access Management (PAM) where you can avoid the risks and security vulnerabilities that can be created by super users with root access.

May 18, 2021 Read More→
 What is Phishing? How to Prevent from it? Krontech

What is Phishing? How to Prevent from it?

One of the common methods for capturing critical data phishing attack; what is that? And how can it be prevented? Explore the details in our article.

May 11, 2021 Read More→
 Privileged Access Management in Cloud Security

Privileged Access Management in Cloud Security

Discover how to protect from the security vulnerabilities of cloud technology with the innovative Privileged Access Management.

May 04, 2021 Read More→