AMAG Technology

Blog

Blog Post

Reduce Blast Radius: Containing the Damage When Things Go Wrong

Zero Trust Series Part 5 of 6, by Senior Product Manager, Hosted Solutions Matt Macintosh How Symmetry CONNECT PIAM limits the potential impact of a compromised credential...
Read More about Reduce Blast Radius: Containing the Damage When Things Go Wrong

Verify Continuously: Access Is Not a One-Time Decision

Zero Trust Series  Part 4 of 6  by Senior Product Manager Hosted Solutions, Matt Macintosh How Symmetry CONNECT PIAM ensures that physical access authorization is a living...
Read More about Verify Continuously: Access Is Not a One-Time Decision

Assume Breach: Building a Physical Security Strategy for the Threat Already Inside

Zero Trust Series, Part 3 of 6  by Senior Product Manager, Hosted Solutions, Matt Macintosh How Symmetry CONNECT PIAM prepares your organization for the reality that your...
Read More about Assume Breach: Building a Physical Security Strategy for the Threat Already Inside

Use Least Privilege: Why Access Should Be Earned, Not Inherited

Zero Trust Series, Part 2 of 6, by Senior Product Manager Hosted Solutions, Matt Macintosh How Symmetry CONNECT Identity Management ensures every person in your facility (employee,...
Read More about Use Least Privilege: Why Access Should Be Earned, Not Inherited

Verify Explicitly: Why Your Badge Reader Alone Is Not Enough

Zero Trust Series, Part 1 of 6 by Senior Product Manager, Hosted Solutions, Matt Macintosh How Symmetry CONNECT PIAM ensures that every access decision is grounded in...
Read More about Verify Explicitly: Why Your Badge Reader Alone Is Not Enough