Securden Eliminates Unveils VPN Hassles with Significant Enhancements to Its Remote Access Solution

Securden | June 10, 2020

  • Securden PAM allows work-from-home IT staff and third-party contractors to launch secure, one-click connections with remote servers, databases, devices, web applications, and other enterprise resources without VPN.

  • Organizations can ensure a centrally controlled, fully audited, zero-trust, just-in-time access that is simple and scalable.

  • Securden eliminates the need for VPN and enables authorized remote users - internal or external - to launch native or web-based RDP, SSH, SQL connections with Windows, Unix servers.


Securden, Inc., a leading provider of Privileged Access Governance solutions today announced that it has implemented significant enhancements to its remote access solution addressing the crucial IT infrastructure access requirements of the remote workforce, specifically the IT administrators, third-party vendors, and contractors. Securden is offering the new version free-to-use for three months.

The security and user-experience related enhancements in the new version enable organizations to allow their internal IT staff who are working from home and the third-party vendors to remotely access critical IT systems that are kept behind corporate firewalls in a single-click without relying on VPN connectivity and without compromising security.

Read More: OVHcloud US Launches New Line of Virtual Private Servers to Meet Cloud-based Application Requirements

 

Amid the COVID-19 pandemic, providing a secure and easily accessible remote work environment has become a big challenge for organizations. VPN connectivity often brings with it operational, security, and scalability issues. The basic tenets of access security - ensuring the right access to the right person only for the required resource and for the required time duration - cannot be fully met resulting in cybersecurity risks,

Bala Venkatramani, CEO of Securden.



"Securden eliminates the need for VPN and enables authorized remote users - internal or external - to launch native or web-based RDP, SSH, SQL connections with Windows, Unix servers; managed desktops; internal web applications; MySQL, PostgreSQL, MS SQL databases; AWS, Azure, and other cloud platforms; switches, routers, firewalls, and other SSH devices from any operating system and from anywhere. It also ensures that users get access only to specific IT assets for a specified time duration fortified through MFA, comprehensive auditing and alerts, live session monitoring, and recordings thereby striking a fine balance between security and ease-of-use," he said.

While allowing live session monitoring, Securden enables administrators to intervene to terminate sessions or collaborate when a colleague needs assistance.

Part of the Securden Privileged Account Manager (PAM) product, the remote access solution readily integrates with various enterprise infrastructure and leverages the authentication mechanism of existing directory services such as Active Directory and federated identity stores to grant remote access.

To reduce the risks associated with remote access, Securden ensures that there is no direct connection between the end-user machines and the sensitive IT resources. It also offers the provision to route all connections through a secure remote gateway.

 

As many organizations may have hurriedly put remote access solutions in place, security may have been a bit of a secondary priority. When bolstering the remote work environment, having an effective means of privileged access management is a great way to ensure that users are only able to get to the resources they need and for the amount of time they need it,

Brandon Lee, Networking and Virtualization Specialist at virtualizationhowto.com.



"With the zero-trust model at the application layer and many other powerful capabilities, Securden Privileged Account Manager (PAM) facilitates remote work connectivity not only easily, securely, and efficiently, but also at scale without VPN," he added.

Read More: HiveIO Becomes Citrix Ready and is Trusted to Enhance Citrix Virtualization Solutions

About Securden

Securden is a leading provider of privileged access governance solutions that uniquely combine the key security principles of zero-trust architecture, least privilege enforcement, and continuous risk assessment to prevent cyberattacks, malware propagation, and insider exploitation. With a refreshingly new approach, Securden offers complete control over privileged access, visibility without barriers, and superior access governance across cloud, physical, virtual environments. Designed for security and scalability with simplicity in mind, Securden products (Password Vault for Enterprises, Privileged Account Manager, and Endpoint Privilege Management and Application Control) are trusted by organizations of all types and sizes, including large banking and financial institutions, government agencies, healthcare organizations, educational institutions, IT service providers, MSPs, and manufacturing companies across the globe.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Related News

VIRTUAL SERVER INFRASTRUCTURE, VIRTUAL SERVER MANAGEMENT

ThinkData Works Launches First-to-Market Automated Warehouse Discovery Solution for Rapid Data Sharing and Management

businesswire | April 13, 2023

ThinkData Works Inc., a leading data catalog provider, is launching a first-to-market solution that will accelerate time to value for its adopters. Customers will be able to automatically gather metadata from their preferred warehouse environment, in addition to automatically scanning and virtualizing multiple datasets within minutes, enabling streamlined sharing and management of data. ThinkData Works' new warehouse discovery solution offers businesses a seamless way to access virtualized data and metadata from multiple warehouses in a single unified data catalog. This cutting-edge tool provides customers an efficient, centralized way to quickly locate, explore, and analyze critical business data from diverse sources. Accessing decentralized data from a single source of truth eliminates massive burdens that slow down innovation and hamper the productivity of business analysts and data science teams. As an added benefit, the risks and costs associated with data duplication and replication are minimized by managing access via ThinkData Works’ catalog platform. Furthermore, the warehouse discovery solution provides improved compliance and governance by maintaining data residency. Leveraging the solution's automated data virtualization and metadata harvesting capabilities, users can tap into data directly from warehouse storage platforms without re-ingestion or relocation. As a result, customers benefit from greater security and control over their data without compromising regulatory compliance. “The research is proven: juggling multiple data solutions is costly and ineffective. Modern organizations need fewer points of failure and more robust data management,” said Bryan Smith, Co-founder and Chief Executive Officer of ThinkData Works. “We’re thrilled that our new warehouse discovery solution will help our clients maximize the value of their data. This makes it easier and faster to get insights out of information, and that’s ideal.” “Introducing automated data virtualization and metadata harvesting capabilities to an already-powerful catalog gives business owners and their networks both data and metadata, plus the management and monitoring tools on our platform, in essentially one click,” adds Lewis Wynne-Jones, VP Product of ThinkData Works. “Beyond saving time and cost, it’s a massive win for data culture and democratization. Real-time connections to virtualized data also means enhanced decision-making — better access leads to better insights.” About ThinkData Works ThinkData Works unlocks the value of data to grow your business. Connect seamlessly to any source, drive critical insights, and deliver data while retaining visibility and control. Founded in 2014, ThinkData Works offers flexible data connections, an intuitive catalog interface, and secure tools to deliver data where it needs to be — inside or outside your organization. Purpose-built to handle the complexities of data variety, their unified cloud platform cuts overhead, fuels innovation, and drives revenue growth.

Read More

VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION

New IDC Study Highlights Network Intelligence Critical for Multi-Cloud Security

Gigamon | March 13, 2023

Gigamon, the industry leader in deep observability, recently announced the results of a new study from an international data corporation (IDC). It surveyed over 900 IT leaders worldwide and provided invaluable insights for CISOs, CIOs, and their IT organizations to improve performance, security, and productivity with observability throughout all their digital infrastructures. The IDC white paper confirmed that leveraging network-derived knowledge and insights is essential for detecting today's complex security threats across hybrid and multi-cloud infrastructures. With 95% of businesses reporting a ransomware attack in 2022, IT security remains a significant priority for executives across all sectors. However, most respondents (over 60%) to the IDC White Paper agree that present observability solutions only address specific needs and don't give a complete picture of how things run. To reduce vulnerabilities in hybrid and multi-cloud environments, it is crucial to supplement the conventional observability capabilities based on metrics, events, logs, and traces (MELT) with real-time network-derived intelligence and insights. Important Findings: Security (34%), staff productivity (33%), and digital/user experience (22%) are the top advantages of observability (25%). Nearly 75% of businesses use or intend to employ deep observability technologies to boost automation initiatives in the coming years. About half of the respondents (51%) of the market will witness significant investments in cloud services Adherence to the SANS 20 Critical Security Controls, supported by network-derived intelligence, can eliminate 98% of attack vectors. Mark Leary, Research Director with IDC, remarked, “Networking, cybersecurity, and observability are becoming intertwined. IT organizations are looking to leverage an immutable source of truth and more collaborative management efforts to break down siloed technology approaches, position themselves for long-term success, and, ultimately, deliver the best possible business outcomes.” (Source – Business Wire) About Gigamon Gigamon has over 4,000 customers in over 100 countries, including nine of the ten largest mobile network providers, 80% of the Fortune 100, and hundreds of government and educational institutions. It offers an entire observability pipeline that uses actionable intelligence at the network level. This potent combination aids in enabling IT firms to guarantee security and compliance control, speed up the investigation of performance bottlenecks, and reduce operational overhead related to managing hybrid and multi-cloud IT infrastructure. Due to this, contemporary businesses can take advantage of everything the cloud offers in terms of innovation.

Read More

VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION

Netskope and Zoom Team Up to Deliver Quality Collaboration Experiences with Optimized Performance, Security, and Compliance

prnewswire | April 03, 2023

Netskope, a leader in Secure Access Service Edge (SASE), today announced new integrations with Zoom Video Communications, Inc. (Zoom) that connect Netskope's Borderless SD-WAN and SaaS Security Posture Management (SSPM) with Zoom UCaaS to deliver one of the most reliable, optimized connectivity and enhanced security solutions for effective user collaboration. Through these Netskope integrations, organizations using Zoom can now significantly enhance the user experience while staying compliant with privacy and security regulations. Unified-communications-as-a-service (UCaaS) users often struggle with low reliability, high latency, and network disruption, all of which limit worker productivity. In addition, organizations face security challenges, including risks coming from users and sites that communicate directly over the internet, compliance with critical privacy regulations, and the complexity and inefficiency present in many branch and remote access solutions. To solve these challenges, Netskope Borderless SD-WAN enables highly reliable, optimized access to Zoom by automatically identifying and prioritizing Zoom connections, and improving network performance with on-demand remediation. Netskope also simplifies remote maintenance of Zoom Phone behind Netskope SASE Gateway with built-in secure inbound access service. In addition, Netskope SaaS Security Posture Management (SSPM) continuously monitors Zoom environments to discover and remediate any misconfigurations that could weaken security, helping maintain compliance with industry standards and regulations. "As a world leading UCaaS provider, Zoom continues to prioritize security coupled with a seamless user experience to make sure that our customers realize the productivity they need, whenever and wherever work happens," said Brendan Ittelson, Zoom CTO. "Zoom can deliver top-notch connection, performance, and security in partnership with Netskope's fully converged, context-aware SD-WAN and SSPM." Optimizing Zoom connectivity Netskope Borderless SD-WAN helps ensure highly reliable, optimized access to Zoom and delivers consistent high-performance access for users working from home, or from a branch office, or from a non-office location such as a coffee shop. As part of the Netskope platform, Borderless SD-WAN employs a unique approach to deliver high-quality performance while simplifying overall operations. Netskope Borderless SD-WAN: Provides full visibility and ML-driven insights with application and real-time path monitoring Includes Netskope quality of experience (QoE) smart defaults for over 60,000 applications, and automatically identifies and prioritizes Zoom sub-applications Improves Network performance with on-demand remediation, sub-second failover, and cloud-onramp to Zoom Simplifies remote maintenance of Zoom Phone behind Netskope SASE Gateway with built-in secure inbound access service Provides unified policy with a consistent experience for users across remote users, branches, and multi-cloud Maximizing Zoom performance with consistent QoE Netskope Borderless SD-WAN can easily identify Zoom Meeting, Zoom Phone, and Zoom Room connectors among traffic from tens of thousands of different workloads regularly egressing from an organization's network. Netskope offers smart defaults that automatically prioritize traffic and minimize latency, jitter, and loss to deliver consistent quality of experience. Netskope Borderless SD-WAN also ensures application performance without compromising payload security, even over a single, unstable broadband internet connection. Strengthening security posture and maintaining compliance Tight integration with Zoom APIs enables Netskope SSPM to provide visibility and insights into configuration settings, compliance status, and security posture. Netskope SSPM supports a broad collection of rules and compliance standards out-of-the-box, as well as the ability to add custom rules based on the data that Netskope gathers about connected Zoom accounts. Compliance administrators can modify and deploy policies to detect violations based on popular benchmarks and standards such as CIS, HIPAA, PCI, CSA, GDPR, AIPCA, ISO, and more. Security alerts include actionable remediation instructions to quickly bring Zoom deployments back into compliance and close any remaining security gaps. "Like so many organizations, we rely on Zoom communications for daily business use and productivity," said Timothy Johnson, Assistant Vice President of ITS Operations, A.T. Still University. "The ability to maintain security, maximize the user experience, and minimize disruptions caused by latency, jitter, and loss between users and apps on unstable links with advanced remediation capabilities of Netskope's Borderless SD-WAN solution are what this compelling integration between Netskope and Zoom expertly delivers." "Together, Netskope and Zoom provide organizations with the ability to deliver the collaboration experience users are expecting, while doing it in a secure way that does not interrupt business and helps them stay compliant with industry standards and regulations," said Parag Thakore, Senior Vice President, Borderless SD-WAN, Netskope. "We are proud to work with Zoom and together look forward to a continued expansion of how our solutions integrate." About Netskope Netskope, a global SASE leader, is redefining cloud, data, and network security to help organizations apply zero trust principles to protect data. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers, including more than 25 of the Fortune 100, trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Read More