Privileged Task Automation: The Natural Extension of Privileged Access Management

A lot has been written about Privileged Access Management (PAM) and for good reason. The number of individuals required to run a modern network – or networks in the context of our multi-network, multi-cloud world – continues to grow.   Gartner cites as reason to invest in PAM the risk of breaches and insider threats, […]

Read More

Sustaining Efficiency While Securing IT Operations

Given the dramatic growth of networks, applications and the equipment powering those applications, the complexity of managing access to service provider and enterprise networks is, in parallel, growing exponentially.   The number of end-users, end-points, and the variety of business applications is adding pressure on network operations and IT teams who are tasked with ensuring […]

Read More

As the Utility Grid Merges with Communications Networks, the Air Gap My Not Protect Critical Assets

It’s deja vu all over again! As the utility grid becomes even more connected, and converges with communications networks to support new applications, including Internet of Things capabilities, new threats and security risks are emerging. The evolution of applications to the cloud is only making the environment more challenging to understand and secure.   Mitigating risks […]

Read More

Privileged Task Automation Myths and Realities: Rolling A Boulder Up a Hill

As more and more network functions are being virtualized, it only follows that the tasks associated those virtualized functions be automated. Privileged Task Automation (PTA), done properly, ensures that tasks which may previously been assigned privileged users (network operations teams, administrators, contractors, and vendors who need access to networks for maintenance and updates) are done […]

Read More