Single Connect™ 2.10.0 Release is Now Available

Enhanced Cloud Support: AWS and Azure Cloud support is now enhanced with auto discovery of virtual instances, accounts and credentials with auto onboarding processes. Seamless integration with AWS and Azure eliminates synchronization issues entirely and secures cloud environment while improving daily operational efficiency.   Privileged Task Automation Workflow based network configuration and execution with validation […]

Read More

Enterprise Network Automation: We Can Do This the Easy Way, or the Hard Way

We’re at a pivotal moment: automation should be a forethought, not an afterthought. There’s a lot of buzz around enterprise network automation which, in our definition, is what enables a closed-loop, self-healing networking architecture using software to assist in the process of identifying irregular activity, understanding the intention of humans interacting with the network, validation […]

Read More

Cloud Computing: Friend or Foe?

The benefits of moving more and more to the cloud are now proven. What do IT teams need to know when contracting with cloud service providers and the communications service providers delivering access and transmission services? The first key to success is thinking long term, and planning optimistically for years of great service; also, when […]

Read More

Security or Efficiency? Why Not Have Both?

A lot is being written about information security; opinions, suggestions, surveys, even conspiracy theories roam around, and news on a prominent organization’s data breach make headlines more often than ever, these days. It is not that people are just catching on to the significance of security and have recently become aware of the consequences.  Instead, […]

Read More

A New Level of Granularity for Access Management: Privileged Task Automation

The future of securing network infrastructure, data, applications and the proliferation of devices enterprises need to secure is in automation. Enterprises are going to require more granular control of access to mission critical assets, and if they don’t think ahead and identify ways to have machines help, they will find themselves stretched to the limit, […]

Read More

Securing the Next Generation of Private Networks for Enterprises

More and more enterprises are turning to their trusted Communications Service Providers (CSPs) to manage more and more of their network and, increasingly, cloud-based services as part of digital transformation initiatives. Securing access to networks, clouds and applications is becoming more complex than ever, exacerbated by the growth of number of accounts, APIs, applications and […]

Read More

Coming in First: Gartner Says PAM Should Be the Top Priority for CISOs

In a post by Gartner’s Jill Beadle, Privileged Access Management (PAM) was named the number one security project Chief Information Security Officers (CISOs) should invest in to reduce risk on a significant scale in large enterprises. “Focus on projects that reduce the most amount of risk and have the largest business impact,” the post quoted […]

Read More

Leader of the Free World Shut Down by Disgruntled Employee at Twitter: Lessons Learned

Late 2017, one of the world’s most famous and active “tweeters” – US President Donald J. Trump – was shut down for eleven minutes when a rogue employee deactivated the account before leaving the company.  In fact, the employee was a contractor, and while eleven minutes may not seem that important in the broader scheme […]

Read More

Data Masking for More Secure Networks and Stronger Compliance

SQL – or Structured Query Language – was first introduced in the early 1970s and was based on the concept of accessing many records using a single command. Since then, many software vendors have implemented SQL within their own database solutions with these core fundamentals in place. Because of this, SQL has become the industry’s […]

Read More

Meet the Krontech Team at Cloud&Cyber Security Expo Asia 16-17 May, in Hong Kong

We’re proud to announce our first year attending the Cloud & Cyber Security Expo Asia at the Hong Kong Convention and Exhibition Center. Krontech welcomes everyone to visit us at our booth to view an application demonstration and answer all of your questions related to the following topics: Logging:  Log all privileged session activities within […]

Read More