Featured Posts

Secure Remote Access Blog Part 1: There are Better Approaches Than a VPN
As the full implications of the Coronavirus pandemic became clear to businesses in March, understandably there was a scramble to enable...
Read More

Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges
Welcome back to the conclusion of our three-part series on Just-in-Time (JIT) access. In part 1 we discussed what Just-in-Time access is and...
Read More

Would You Bolt Your Front Door and Leave Your Back Door Unlocked?
If you leave your house, there’s a good chance that you always lock and bolt the front door. But would you leave the back door unlocked for...
Read More

Just-in-Time (JIT) Access Series Part 2: JIT Approaches
Welcome back to this blog series on Just-in-Time (JIT) access. In part 1, we discussed what Just-in-Time access is, and where it fits into...
Read More

Just-in-Time (JIT) Access Series Part 1: Is Just-in-Time Enough?
In the Privileged Access Management (PAM) space, there are some new trends gaining traction within the market, and a big shift taking place...
Read More

SAMA Cyber Security Framework: Improving Cyber Resilience
According to Gartner, cyber security is one of the top risks for businesses in the Middle East. Within that region, Saudi Arabia is one of...
Read More