Security and operations teams place their faith in solutions that help them meet compliance requirements and protect their environments from threats and data breaches. However, in the pursuit of their security goals, many solutions overlook a critical aspect of problem solving — the user experience (UX) of the solution, particularly for the admins and engineers who use them daily.
Posts by Category:
- Security
- Access
- Auditing
- Policy
- Privileged Access Management
- SOC 2
- Zero Trust
- Compliance
- Authentication
- DevOps
- Identity and Access Management
- Compare
- Team
- Databases
- Product
- Integrations
- Podcasts
- Productivity
- AWS
- Kubernetes
- ISO 27001
- SSH
- Dynamic Access Management
- HIPAA
- Observability
- Role-Based Access Control
- Secure Access Service Edge
- Webinars
- Events
- Engineering
- NIST
- Onboarding
- Passwordless
- Offsites
- Platform
- PCI
Standing Credentials. They’re a problem that seems to persist despite the latest security and access innovations. They’re also one of the main reasons that achieving zero trust is so hard–and enough of a problem that two strategic security initiatives have come to the forefront: Just-in-Time (JIT) access and Zero Standing Privileges (ZSP).