Securden Eliminates Unveils VPN Hassles with Significant Enhancements to Its Remote Access Solution

Securden | June 10, 2020

Securden Eliminates Unveils VPN Hassles with Significant Enhancements to Its Remote Access Solution
  • Securden PAM allows work-from-home IT staff and third-party contractors to launch secure, one-click connections with remote servers, databases, devices, web applications, and other enterprise resources without VPN.

  • Organizations can ensure a centrally controlled, fully audited, zero-trust, just-in-time access that is simple and scalable.

  • Securden eliminates the need for VPN and enables authorized remote users - internal or external - to launch native or web-based RDP, SSH, SQL connections with Windows, Unix servers.

Securden, Inc., a leading provider of Privileged Access Governance solutions today announced that it has implemented significant enhancements to its remote access solution addressing the crucial IT infrastructure access requirements of the remote workforce, specifically the IT administrators, third-party vendors, and contractors. Securden is offering the new version free-to-use for three months.

The security and user-experience related enhancements in the new version enable organizations to allow their internal IT staff who are working from home and the third-party vendors to remotely access critical IT systems that are kept behind corporate firewalls in a single-click without relying on VPN connectivity and without compromising security.

Read More: OVHcloud US Launches New Line of Virtual Private Servers to Meet Cloud-based Application Requirements


Amid the COVID-19 pandemic, providing a secure and easily accessible remote work environment has become a big challenge for organizations. VPN connectivity often brings with it operational, security, and scalability issues. The basic tenets of access security - ensuring the right access to the right person only for the required resource and for the required time duration - cannot be fully met resulting in cybersecurity risks,

Bala Venkatramani, CEO of Securden.

"Securden eliminates the need for VPN and enables authorized remote users - internal or external - to launch native or web-based RDP, SSH, SQL connections with Windows, Unix servers; managed desktops; internal web applications; MySQL, PostgreSQL, MS SQL databases; AWS, Azure, and other cloud platforms; switches, routers, firewalls, and other SSH devices from any operating system and from anywhere. It also ensures that users get access only to specific IT assets for a specified time duration fortified through MFA, comprehensive auditing and alerts, live session monitoring, and recordings thereby striking a fine balance between security and ease-of-use," he said.

While allowing live session monitoring, Securden enables administrators to intervene to terminate sessions or collaborate when a colleague needs assistance.

Part of the Securden Privileged Account Manager (PAM) product, the remote access solution readily integrates with various enterprise infrastructure and leverages the authentication mechanism of existing directory services such as Active Directory and federated identity stores to grant remote access.

To reduce the risks associated with remote access, Securden ensures that there is no direct connection between the end-user machines and the sensitive IT resources. It also offers the provision to route all connections through a secure remote gateway.


As many organizations may have hurriedly put remote access solutions in place, security may have been a bit of a secondary priority. When bolstering the remote work environment, having an effective means of privileged access management is a great way to ensure that users are only able to get to the resources they need and for the amount of time they need it,

Brandon Lee, Networking and Virtualization Specialist at

"With the zero-trust model at the application layer and many other powerful capabilities, Securden Privileged Account Manager (PAM) facilitates remote work connectivity not only easily, securely, and efficiently, but also at scale without VPN," he added.

Read More: HiveIO Becomes Citrix Ready and is Trusted to Enhance Citrix Virtualization Solutions

About Securden

Securden is a leading provider of privileged access governance solutions that uniquely combine the key security principles of zero-trust architecture, least privilege enforcement, and continuous risk assessment to prevent cyberattacks, malware propagation, and insider exploitation. With a refreshingly new approach, Securden offers complete control over privileged access, visibility without barriers, and superior access governance across cloud, physical, virtual environments. Designed for security and scalability with simplicity in mind, Securden products (Password Vault for Enterprises, Privileged Account Manager, and Endpoint Privilege Management and Application Control) are trusted by organizations of all types and sizes, including large banking and financial institutions, government agencies, healthcare organizations, educational institutions, IT service providers, MSPs, and manufacturing companies across the globe.


This document provides insight into the considerations and processes required to implement a backup strategy of VMware using vSphere with Bacula Enterprise Edition version 8.0, 8.2 and 8.4. It also covers in depth how to restore specic les (Single File Recovery) from backups made with Bacula Enterprise vSphere Plugin.

Related News

Microsoft vague on the future of Windows virtualization on Mac following Apple Silicon transition

Microsoft | June 25, 2020

At WWDC this week, Apple detailed its roadmap to transition the Mac lineup from Intel processors to Apple Silicon chips. One of the biggest questions about this transition has been what it means for the future of Boot Camp, and a new statement from Microsoft provides little clarity on what the future holds for Windows virtualization on Mac. In a statement to The Verge, a Microsoft spokesperson explained that the company currently only licenses Windows 10 for ARM to manufacturers to pre-install on their hardware. Windows 10 for ARM is not available for anyone to license and install elsewhere, unlike Windows for other technologies. There are potential solutions to this problem, but the future is unclear.

Read More


RevBits Zero Trust Network Strengthens Network Security and Protects Digital Assets

RevBits | October 05, 2021

RevBits, a software provider for a complete 360-degree cyber defense, today announced availability of RevBits Zero Trust Network (ZTN). RevBits ZTN is a thin-client application providing authenticated access for remote users and devices to applications, services and data, with comprehensive network security. The remote workforce and third-party access are elevating the security risk for business. Moving network protection to endpoints, RevBits ZTN isolates and protects internal assets, without implementing complicated network segmentation. Supporting a default no-trust security posture, RevBits ZTN provides in-transit data security through encryption, secure access to applications and services, and network security through user and device authentication. "As enterprise threat levels rise, rethinking cybersecurity and perimeter control is paramount. It is no longer a matter of ensuring data encryption for remote users through a VPN as a complement for network security; organizations must adopt a default no-trust posture." said David Schiffer, CEO at RevBits. Building upon its technological innovation in the access management marketplace, through the award-winning RevBits Privileged Access Management (PAM), RevBits ZTN expands access management and control to the individual user level, with unified visibility and analytics, from a single vendor. Virtual Private Networks (VPNs) have been the main security tool for remote access. However, VPN protection stops at the network perimeter, leaving the internal network vulnerable. VPN provides a level of protection by encrypting data in transit and a layer of obfuscation. However, it doesn't authenticate users or their devices, leaving the network open to attackers if VPN credentials are stolen. RevBits ZTN provides data security with encryption and granular access control to digital assets, by authenticating all users and devices. "Based on our unique architecture and patent-pending technologies, RevBits ZTN provides best in class protection," said Mucteba Celik, CTO at RevBits. "By combining the principles from our PAM solution, RevBits ZTN delivers data encryption, comprehensive obfuscation, granular user and machine access control, and monitoring to protect digital infrastructure." RevBits ZTN feature highlights Proxy servers located in 24 globally distributed cloud regions for fast, secure connections and automatic scaling. Multiple options for user authentication, including fingerprint, facial recognition, YubiKey, SAML, MFA and others. Control every aspect of a remote session, including monitoring, reviewing, recording and killing sessions with one click. About RevBits RevBits delivers new levels of security IQ through context-rich behavioral analysis, artificial intelligence and machine learning. RevBits Cyber Intelligence Platform (CIP) is a unified security platform that integrates a best-in-class suite of Detection and Response, Privileged Access Management, Email Security, Deception Technology, and Zero Trust Network solutions. RevBits empower security operations with a complete cyber defense; encrypting, authenticating, authorizing, and intelligently analyzing layered context-rich security data across the security stack. RevBits dashboard unifies cross-functional security presenting an intuitive 360-degree view. Taking cybersecurity to the next level, RevBits is innovating new capabilities, with multiple patented technologies to ensure enterprises have a security advantage.

Read More


Windstream Enterprise Announces New SD-WAN Enhancements with VMware

Windstream | June 02, 2021

Windstream Enterprise (WE), a provider of managed communications services, has announced new feature enhancements and hardware for its VMware-powered SD-WAN. VMware's three new SD-WAN edge devices represent the company's next-generation technology, named a Leader in the 2020 Gartner Magic Quadrant for WAN Edge Infrastructure. These new edge devices provide improved performance with enhanced processors that offer additional functionalities and simplified design and deployment with less complexity. Windstream Enterprise will now provide customers with industry-leading SD-WAN technology due to the enhancements. By integrating SD-WAN with security, the new SD-WAN edges assist in the evolution of the SASE (Secure Access Service Edge). MNS is deployed as a Virtual Network Function (VNF) on the VMware edge, providing unified threat management security for the SD-WAN network. Customers will be able to access the MNS VNF using Windstream Enterprise's award-winning WE Connect portal to remotely self-service, view, and configure their VNF firewalls to enable the following benefits: • View firewall details and policies to ensure proper network protection configuration. • Manage web filtering policies, such as the ability to block specific URLs or categories depending on content. • Policies for application control that protect employees from inappropriate, harmful, and unprotected apps • Reports are generated automatically to review and audit online activity and potentially risky behavior. About Windstream Windstream Holdings is a communications and software company that is privately held. Windstream provides managed communications services, such as SD-WAN and UCaaS, and high-capacity bandwidth and transport services to businesses across the United States. In addition, with an enhanced fiber network and 5G fixed wireless service, the company provides premium Internet, entertainment, and security services to consumers and small and midsize businesses primarily in rural areas in 18 states.

Read More


This document provides insight into the considerations and processes required to implement a backup strategy of VMware using vSphere with Bacula Enterprise Edition version 8.0, 8.2 and 8.4. It also covers in depth how to restore specic les (Single File Recovery) from backups made with Bacula Enterprise vSphere Plugin.