Latests Blog Posts
Identity and access management traces its roots back to the mainframe era. DoD first employed logical...
Image credit: Unsplash Passkeys are emerging as a popular passwordless phishing resistant authentication technology....
Image credit: Unsplash Ken Thompson the creator of Unix operating system and C programming language gave his now...
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly...
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become...
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we...
News & Artices
In today's relentless cyber threat landscape, one challenge stands out as the predominant factor behind security breaches: credential compromise. As businesses navigate the digital age, malicious...
“CIO Perspectives” is a whitepaper series by Mark Settle that explores the top-of-mind technical issues confronting today’s CIOs and IT leaders. Mark is a seven-time CIO, a three-time CIO 100 award...
Akash Agarwal, Chief Business Officer, Procyon, discusses how Procyon raised $6.5 million in funding toward launching its privileged access management platform which will reinvent how DevOps teams...
Lucas Moody SVP & CISO at Alteryx shares the story about the complexity of cloud and credential sprawl challenges.
Procyon Launches Next Generation Cloud Based Privilege Access Management (PAM) Solution for Multi-Cloud Identity and Access Management; The Company Also Announced $6.5M in Funding The funding...
Lobby Capital led the investment round with participation from GTM Capital and First Rays Venture Partners. Procyon co-founder and Chief Executive Sukhesh Halemane and Chief Business Officer Akash...
Privileged Access Management (PAM) broadly refers to the policies, procedures and tools used to manage IT resources. Standard IT users employ IT resources to perform business activities. Privileged...
Procyon is the first solution on the market to offer infrastructure access without static credentials. TPM and biometrics remove the need for vulnerable static credentials to making your information...
Akash Agarwal, head of GTM at Procyon, discusses challenges with cloud infra access. The explosion of cloud services has driven the proliferation of privileged accounts and credentials to a state...