CyberArk recognizes CyberSheath as the “2015 Newcomer Partner of the Year”

By Eric Noonan • July 27, 2015

Last week I had the opportunity to attend the CyberArk 2015 Americas Summit in Boston Massachusetts where CyberSheath was recognized as the “2015 Newcomer Partner of the Year”. We were honored by the award and inspired by the event itself as it was refreshing to be in a venue with nearly five hundred like-minded security professionals focused on one of the most important aspects of security, privileged account management.

Privileged account management is a lot like exercise in that it’s a “pay now” or “pay later” equation.

Privileged account management is a lot like exercise in that it’s a “pay now” or “pay later” equation.  You can enjoy a high carb, low exercise lifestyle right up until you can’t. The can’t, or “pay later”, comes when you’ve been breached and suddenly have to account for a decade of nonexistent or bad privileged account policy. Promiscuously granted admin rights and never changing service account passwords are a treasure trove for advanced attackers and are a common theme in nearly every publicized high profile attack.

Having led an organization that reactively addressed privileged accounts (domain admin, local admin, service accounts, etc.) for more than 40,000 employees in the midst of a breach I’ve lived the “pay later” scenario and I’d encourage you to avoid it at all costs. Privileged accounts should be something that you are executing on now and not on that “to do” list on your whiteboard.

How Can CyberSheath Help Your Organization?

CyberSheath’s engineers are well versed in fine-tuning the configuration of the Privileged Account Management suite; providing an automated, monitored, and controlled elevated privileged access.  You can learn more about our approach by viewing our Privileged Access Management service area.

CyberSheath Blog

Dr. Robert Spalding to Address Nation-State Attacks at CMMC Con 2021

Since the inaugural CMMC Con, we’ve seen some of the most malicious attacks on American infrastructure ever executed. The SolarWinds attack reverberated across the entire government as agencies scrambled to discover what nation-state attackers had accessed and stolen. The Colonial Pipeline, shut down by a ransomware attack, led to fuel…

CMMC-AB vice chair Jeff Dalton to address CMMC Con 2021

The swiftness and severity of recent cyber attacks has dominated headlines and revealed that many organizations still don’t quite know what to do to protect themselves, as well as the businesses and government entities they’re connected to.   Ransomware attacks were a big point of discussion at the recent G7…

CMMC Con 2021 Opens Registration, Reveals Theme and Speakers

CMMC compliance stands in the way of revenue for every defense contractor in the supply chain. Now that CMMC is a reality for the Defense Industrial Base (DIB), learn how contractors — primes and subs, large and small, foreign-owned — are handling the standards and requirements, as well as the…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Microsoft

CMMC Con 2021 is here! Save your spot to hear the latest on CMMC from our expert speakers across the government and Defense Industrial Base.