The Virtualization Practice

Xceedium

Twitter Feed for Xceedium

December 21st, 2014 at 3:00am
Poor management of SSH session keys risks critical IT assets. @Xceedium’s latest white paper tackles the challenge: http://t.co/CCTsq6XkV5
December 20th, 2014 at 9:00pm
Webcast: Prevent breaches - watch Privileged Identity - The Core of the Kill Chain http://t.co/F6blgW62mR #PIM
December 20th, 2014 at 5:34pm
The Gartner IAM event drew record crowds, including Xceedium’s @xcdtrevorbrown. Read his observations: http://t.co/xQfJ17h1qK #GartnerIAM
December 20th, 2014 at 1:00pm
The Sony breach, and others like it, began with stolen administrative credentials. Protect privileged credentials: http://t.co/09tiULo02v
December 20th, 2014 at 11:00am
Sony breach traced to stolen administrative credentials. Learn how to protect privileged credentials on the blog: http://t.co/09tiULo02v
-Return from Social Media-