Blog

Privileged Task Automation: The Natural Extension of Privileged Access Management

Privileged Task Automation: The Natural Extension of Privileged Access Management

A lot has been written about Privileged Access Management (PAM) and for good reason. The number of individuals required to run a modern network – or networks in the context of our multi-network, multi-cloud world – continues to grow.

Oct 04, 2017 Read More→
Sustaining Efficiency While Securing IT Operations

Sustaining Efficiency While Securing IT Operations

Given the dramatic growth of networks, applications and the equipment powering those applications, the complexity of managing access to service provider and enterprise networks is, in parallel, growing exponentially.

Oct 04, 2017 Read More→
Human Error to Intentional Misdeeds: From Downtime to Disaster

Human Error to Intentional Misdeeds: From Downtime to Disaster

The hot news lately has been about the compromise of networks by outside intruders. The facts show that internal breaches, whether intentional or accidental, done innocently or with malicious intent, comprise nearly half of all hacks. Here are a few statistics:

Oct 04, 2017 Read More→
Will Legacy Infrastructure Strike Back?

Will Legacy Infrastructure Strike Back?

Despite all of the investments being made in transforming networks, both those of service providers and the enterprises they serve, legacy equipment sitting in today’s networks will be around for some time. Why?

Oct 04, 2017 Read More→
Protect What You Connect: Krontech’s Vision, Our Collective Mission

Protect What You Connect: Krontech’s Vision, Our Collective Mission

Today Krontech introduced our new theme and tagline: Protect What You Connect™. We have not taken the common path – we are disrupters and innovators, not because it is cool to be, but because we all share a common desire to protect what we connect.

Oct 04, 2017 Read More→