Xceedium

Xceedium The Leading Provider of Zero Trust Privileged Access Control Solutions. Control, Contain and Monitor Privileged User Access to Critical IT Assets.
Xceedium is the leading provider of Zero Trust Privileged Access Control solutions. Xceedium offers solutions for commercial enterprises and government agencies that need to control and audit privileged IT users and third parties who have access to critical infrastructure and/or sensitive data. Xceedium's Xsuite is alone in its ability to allow government and commercial enterprises to enforce access control on vendors, contractors and employees such as IT administrators, regardless of whether they sit inside or outside of the corporate network. It also provides privileged user and application-to-application password management. Xsuite contains users so that they only see and have access to the IT resources that they require. Additionally, it creates an audit trail to help demonstrate compliance with the IT security requirements of PCI, FISMA, NERC, FIPS, HIPAA and other regulations. A rapidly growing number of the largest government agencies and enterprises rely on Xsuite to help ensure compliance and to secure sensitive data and systems. Xceedium's Xsuite is also certified with Common Criteria EAL4+, FIPS 140-2, Level 2, and JITC PKI/CAC.
(1)

Xceedium is now a part of CA Technologies, and the whole team is looking forward to next week’s CA World in Las Vegas. W...
11/13/2015
CA World ’15 - CA Technologies

Xceedium is now a part of CA Technologies, and the whole team is looking forward to next week’s CA World in Las Vegas. We can’t wait to connect with attendees to talk about addressing the challenges of managing privileged access in complex hybrid enterprises. Come check us out – we’ve prepared multiple opportunities to learn more, get answers to questions, and see the latest in privileged access management technology in action. Here’s a rundown on events:

- November 17th @ 9:00am (SCX09E), Shawn Hank’s pre- conference education program will provide an overview of CA Technologies strategy for privileged account management, including an in-depth exploration of the key capabilities of CA Xsuite, CA Technologies solution for protecting and defending privileged accounts and credentials from attack, and managing, controlling, and auditing the activities of privileged users.

- November 18th @ 2:00pm (SCT335), Mo Rosen and VMware’s Jeremiah Cornelius will present on the latest advances for Privileged Access Management in Software-Defined Networks. You’ll learn more about the ability of NSX to transform your network operations and the inherent capabilities it brings for enhanced security. You’ll also learn about industry-leading privileged access management capabilities for the NSX environment being delivered in CA Privileged Access Manager, the results of a two-year partnership with VMware, which allow you to monitor and control the activities of privileged users and to protect and secure the credentials they use — helping to avoid damaging security breaches and enhancing your ability to address compliance and audit mandates.

- November 18th @ 3:00pm (SCT19T), Dale Gardner will discuss how to break the kill chain – We’ll examine how attackers exploit privileged users and their credentials to carry out breaches. We’ll then explain how CA Privileged Access Management can stop attackers at multiple points in the data breach lifecycle, preventing damage, loss, and operational disruptions.

- November 19th @ 11:30am (SCT32T), Shawn is back to provide a deep dive on privileged access management for the Software-Defined Network. New extensions to CA Privileged Access Manager significantly expand the ability of the product to protect and defend resources in VMware NSX virtualized network environments. We’ll examine those capabilities, which take advantage of new technologies and methods made available by the NSX infrastructure, in more detail, and demonstrate how they deliver sophisticated new security capabilities that make operations in NSX-based networks more secure than ever.

- November 19th @ 4:30pm (SCT075), Mike Dullea will present CA’s roadmap for Privileged Access Management and show how these capabilities can help prevent you from being the next victim of a public breach.

- Don’t forget to visit the demo station on the show floor to see multifactor authentication in action, controlling privileged user access to resources, monitoring activity, and more…

- Still have questions? Stop by the Smart Bar to meet with product experts ready to tackle your specific issue…

And there’s plenty of time for fun and networking as well – don’t forget Fall Out Boy and Sheryl Crow will be there too! #CAWorld http://bit.ly/1RzLuIn

We live in an application economy. In order to survive, businesses need to know how to navigate this new reality and take advantage of the opportunities tomorrow will bring. Join CA Technologies CEO Mike Gregoire and industry leaders at CA World ’14, where you’ll not only learn the new rules for survival, you’ll see and test-drive the software that will fuel the transformation for leading companies in this new era.

Xceedium is pleased to announce we’ve executed an agreement to be acquired by CA Technologies. Privileged identity manag...
08/04/2015
CA Technologies to Acquire Xceedium and Provide Comprehensive Offering for Combatting Privileged...

Xceedium is pleased to announce we’ve executed an agreement to be acquired by CA Technologies. Privileged identity management has emerged as a critical element of an enterprise’s overall security strategy, providing essential controls and capabilities that help prevent and mitigate the impact of devastating data breaches, and aiding compliance. By joining with CA Technologies, Xsuite will add important capabilities to an exceptional portfolio of IAM Read more: http://www.businesswire.com/news/home/20150804006029/en/CA-Technologies-Acquire-Xceedium-Provide-Comprehensive-Offering#.VcC7j3grc4M

CA Technologies (NASDAQ:CA) today announced it has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged id

06/04/2015
Xceedium Selected as 2015 Red Herring Top 100 Winner | Xceedium

I'm very excited to share that Xceedium has been recognized as a Red Herring Top 100 award winner for 2015. The recognition is the latest in a string of achievements for the company, including 82% year over year revenue growth in Q1, which surpassed the 70% hike achieved for all of 2014. Thanks to all of our customers, and congratulations to the entire Xceedium team. http://xcdm.co/1Ige4Lp

Xceedium announced it has been selected as a winner of the Red Herring Top 100 North America award. The cybersecurity company was recognized for its sustained

Want to stop damaging data breaches? Focus on privileged users. In incident after incident, privileged users and their e...
02/13/2015
Breaking The Kill Chain | BrightTALK

Want to stop damaging data breaches? Focus on privileged users. In incident after incident, privileged users and their exploited credentials have been revealed as the successful initial attack vector or a crucial element of the attack chain. Join us live on Thursday, February 19th at 2 pm ET (or on demand at your convenience) to learn how to successfully break the kill chain and defend your IT infrastructure. Register now: http://xcdm.co/1ypONGC

Cybercrime is a $400 billion a year undertaking, exceeding the take from drug trafficking and the GDP of many countries. And, as a string of recent incidents has shown, targeted system breaches are increasingly a tool of nation-states seeking intellectual...

The recent Gartner Identity and Access Management event drew record crowds to Las Vegas, including Xceedium’s Director o...
12/12/2014
Trip Report: Gartner Identity and Access Management | Xceedium

The recent Gartner Identity and Access Management event drew record crowds to Las Vegas, including Xceedium’s Director of Product Management, Trevor Brown. You can read his observations and key takeaways from the event here: http://xcdm.co/1AqpFSR

Trevor Brown, Xceedium's Director of Product Management, recently attended the annual Gartner IAM Summit. He shares his observations on themes from this rapidly

A great article in today's New York Times, in case you missed it, on the inevitable risks of third party remote access. ...
07/31/2014
Checking In From Home Leaves Entry for Hackers

A great article in today's New York Times, in case you missed it, on the inevitable risks of third party remote access. We see this attack vector repeatedly in breaches, where attackers are able to compromise - through social engineering or brute force - sensitive administrative credentials to gain access to networks in order to plant malware. It's an unnecessary risk since it's possible to offer needed access with a higher degree of security and confidence. http://xcdm.co/1o9iaMl

Hackers are exploiting the tools that help Americans work from home to break into retailers’ computer networks, says a Homeland Security report.

Join us for our next webinar!
04/22/2014
Top Ten Best Practices for Privileged Identity Management

Join us for our next webinar!

Successfully tackling privileged identity management in hybrid cloud environments requires rethinking both technical tools and operational processes for managing risk. In this fast-moving session, Xceedium's Dale Gardner will outline the Top Ten Best Prac...

Target missed multiple opportunities to detect and stop its 2013 data breach, according to a kill chain analysis prepare...
04/02/2014
Target missed many warning signs leading to breach - U.S. Senate report | Reuters

Target missed multiple opportunities to detect and stop its 2013 data breach, according to a kill chain analysis prepared by staffers from the US Senate's Committee on Commerce, Science, and Transportation. Reports indicate the company didn't respond to warnings of malware and signs attackers were exfiltrating data, allowed a third-party vendor to have insecure access to its network, and didn't isolate its most sensitive network assets. Congress is investigating the breach, along with others. http://xcdm.co/1jzVlyJ

WASHINGTON (Reuters) - Target Corp missed multiple opportunities to thwart the hackers responsible for the unprecedented holiday shopping season data breach, U.S. Senate staffers charged in a committee

Privileged users, insiders and trusted third parties, pose significant risks. Managing enterprise IT infrastructure dema...
03/30/2014
Defending Against Privileged Insider Threats | Xceedium

Privileged users, insiders and trusted third parties, pose significant risks. Managing enterprise IT infrastructure demands trust. But, as a string of large-scale breaches have vividly demonstrated, trust can be misplaced. Regulators and auditors are increasing their scrutiny, and at the same time the cloud has vastly expanded the attack surface – making the job harder. In Xceedium's latest webcast, Defending Against Privileged Insider Threats, you'll learn how to defend yourself. Plus, learn how to Test Drive Xsuite on AWS. http://bit.ly/QuMkwL

Privileged users, both insiders and trusted third parties, pose significant risks, requiring a level of trust that can easily be misplaced. Learn how to defend yourself in this webcast.

03/21/2014
Webcast: Defining Next-Generation Privileged Identity Management

Defending Against Privileged Insider Threats: Live webcast - Tuesday March 25 11 am ET. Managing complex enterprise IT infrastructure demands trust. But, as breaches and incidents prove, trust can be misplaced. In this webcast, you'll discover how changes like the cloud have complicated the task of monitoring, controlling, and auditing privileged users; growing compliance and audit demands; and critical requirements for privileged identity management technology in today's IT environment. Then watch a live demonstration of Xsuite, Xceedium's next-generation privileged identity management solution. http://xcdm.co/1jfX0Yu

Join us on Wednesday, January 22rd at 11 am ET to learn why Next-Generation Privileged Identity Management is needed to protect against the risks posed by trusted users in this challenging new environment.

Managing Insider Threats? In the News: Xceedium's Chief Strategy Officer Ken Ammon joins analyst Eric Ogren, and Bay Dyn...
03/18/2014
New methods for addressing insider threats: A roundtable discussion - Network World

Managing Insider Threats? In the News: Xceedium's Chief Strategy Officer Ken Ammon joins analyst Eric Ogren, and Bay Dynamics CEO Feris Rifai to discuss methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees. http://xcdm.co/1fVB4CY

Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insid...

02/27/2014

It's not just about passwords, people. APIs need to be looked at too. Xceedium Xsuite does it. #infosec #cloud #api

The availability of robust cloud management APIs introduce powerful new capabilities enabling more efficient and respons...
02/27/2014
Protecting Cloud Management APIs | Xceedium

The availability of robust cloud management APIs introduce powerful new capabilities enabling more efficient and responsive IT solutions. But they also bring new privileged user risks that must be addressed. Read more in the blog: http://xcdm.co/1cpCxfL #PIM #cloudsecurity

The cloud introduces powerful new capabilities, but brings with it all the privileged user risk management challenges of traditional IT - and some new ones as well. We focus on how to control management APIs.

Quantiq International has selected Xceedium as their exclusive privileged identity management technology provider. As pa...
02/25/2014
Quantiq International Selects Xceedium As Exclusive Privileged Identity Management Technology...

Quantiq International has selected Xceedium as their exclusive privileged identity management technology provider. As part of the agreement between the firms, Quantiq -- a leading security architect in the APAC region -- will take over exclusive distribution of Xsuite in multiple geographies. http://xcdm.co/1esMVmA

Xceedium announced an agreement with Quantiq International making Xsuite® the only insider threat solution Quantiq sells, distributes, and supports, and granting Quantiq extensive exclusive distribution rights.

Xceedium announced today it has been awarded a core patent for privileged identity management technologies, including pr...
02/24/2014
Xceedium Awarded Core Patent for Privileged Identity Management | Xceedium

Xceedium announced today it has been awarded a core patent for privileged identity management technologies, including privileged user identity brokering, session management, and fine-grained access control. More details at http://t.co/VvYYhqjgcf

Xceedium has been issued a patent for privileged identity management technologies including privileged user identity brokering, session management, and fine-grained access control

We're into 2014, and all signs continue to point to it as the year of the insider threat. Today on the blog, we outline ...
01/29/2014
2014: Year of the Insider Threat | Xceedium

We're into 2014, and all signs continue to point to it as the year of the insider threat. Today on the blog, we outline the three high level trends that are driving risks and increased attention to the challenges of managing privileged users. And we provide some ideas on how to get control over the situation. Please read the post at http://xcdm.co/1mYkVw1 and share your thoughts here.

Three broad trends will combine to make 2014 the year of the insider threat. Read why, and what's needed to protect sensitive IT resources across the hybrid cloud.

Webcast: Join us 1/22 at 11 am for Defining Next Generation Privileged Identity Management - details and registration at...
01/16/2014
Registration Open: Next-Generation Privileged Identity Management Webcast | Xceedium

Webcast: Join us 1/22 at 11 am for Defining Next Generation Privileged Identity Management - details and registration at http://xcdm.co/19wHbfA We'll cover how changes in IT infrastructure are increasing the need for privileged identity management – and making the job harder than ever.

Join us for "Defining Next Generation Privileged Identity Management," Xceedium's next webcast. We'll cover how changes in IT infrastructure are driving changes in privileged identity management -- and what you need to do.

Address

2214 Rock Hill Rd, Ste 100
Herndon, VA
20170

Alerts

Be the first to know and let us send you an email when Xceedium posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Xceedium:

Nearby computer & electronics services


Other Computer services in Herndon

Show All