The Virtualization Practice


Twitter Feed for Xceedium

December 21st, 2014 at 3:00am
Poor management of SSH session keys risks critical IT assets. @Xceedium’s latest white paper tackles the challenge:
December 20th, 2014 at 9:00pm
Webcast: Prevent breaches - watch Privileged Identity - The Core of the Kill Chain #PIM
December 20th, 2014 at 5:34pm
The Gartner IAM event drew record crowds, including Xceedium’s @xcdtrevorbrown. Read his observations: #GartnerIAM
December 20th, 2014 at 1:00pm
The Sony breach, and others like it, began with stolen administrative credentials. Protect privileged credentials:
December 20th, 2014 at 11:00am
Sony breach traced to stolen administrative credentials. Learn how to protect privileged credentials on the blog:
-Return from Social Media-