Xceedium

Partners - Support - Contact Us

Xceedium News Coverage

 

 

Nextgov

July 16, 2014
Why A Detection-Centric Approach to Cybersecurity Is The Wrong Path For Federal
Xceedium’s Chief Strategy Officer Ken Ammon highlights ways agencies can create a balance between prevention and detection, in response to calls for increased intrusion detection efforts.

WashingtonExec

May 29, 2014
Ken Ammon of Xceedium Addresses Cybersecurity
Ken Ammon, chief strategy officer at Xceedium, recently discussed the future of cybersecurity with WashingtonExec. He also talked about infrastructure integrity and how the government responds to insider threats.

Federal News Radio

May 5, 2014
Ken Ammon, Chief Strategy Officer, Xceedium
Agencies are getting smarter about cyber. The Homeland Security Department and General Services Administration are fine-tuning a contracting vehicle for tools that let agencies not only monitor their computer networks 24/7, but also fix things that go wrong. The umbrella term for the tools is continuous diagnostics and mitigation (CDM). Xceedium is a supplier of CDM software products. Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what’s in store for phase two of CDM.

FierceCIO

April 9, 2014
The year of the insider threat
While organizations try to remain on guard against a host of outside IT security threats, this year may in fact be the year of the insider threat. FierceCIO’s David Weldon speaks with Xceedium’s Ken Ammon, who describes the changing nature of insider threats, and the dramatic increase in impact such threats pose, due to the increasing amount of critical and sensitive data that inside employees may have access to, and the desire by wrong-doers to broadcast their exploits.

Network World

March 17, 2014
New methods for addressing insider threats: A roundtable discussion
Xceedium’s Chief Strategy Officer Ken Ammon joins analyst Eric Ogren, and Bay Dynamics CEO Feris Rifai to discuss methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees.

The Washington Post

March 16, 2014
Behind the career: Mordecai B. Rosen
Mo Rosen, recently appointed Chief Operating Officer for Xceedium, talks about his career, leadership, and family in this Washington Post profile.

The Washington Post

March 16, 2014
New at the top: When Mordecai Rosen started, tech was ‘bearskins and stone knives’

More from Xceedium’s COO Mo Rosen recent discussion with Vanessa Small in the Washington Post.

Government Security News

February 23, 2014
The Do’s and Don’ts of privileged user access control
Widely publicized breaches, like the Edward Snowden incident, and a raft of compliance updates and cybersecurity initiatives across the Federal sector have prompted a renewed attention on privileged user access controls. Xceedium’s Chief Strategy Officer, Ken Ammon, offers a targeted do’s and don’t list for getting control of privileged user access.

CSO

February 11, 2014
If Target got breached because of third party access, what does that mean for you?
Michael Santarcangelo provides guidance for security professionals on managing the risks posed by privileged access by third parties, like contractors. Moving beyond traditional VPN solutions and actively managing third party passwords are among the best practices recommended by Ken Ammon, Xceedium’s Chief Strategy Officer.

Cloud Computing Journal

January 22, 2014
2014 Trends – The Year of the Insider Threat
Xceedium’s Dale Gardner offers an analysis of the trends that promise to make 2014 the year of the insider threat – and provides guidance on how to respond.

SearchCloudComputing

November 13, 2013
AWS customers get advice from the trenches on cloud security
According to Vodaphone officials, traditional security methods are not the best fit for the cloud, as reported by Beth Pariseau in this dispatch from Amazon Web Services re:Invent conference. In the article, she details the security tools and approaches the company uses, including Xsuite, to allow them to trust their AWS deployment as much or more than on-premises infrastructure.

InformationWeek

September 2, 2013
Audit Fail
Joe Masters Emison from InformationWeek provides practical guidance on how to address compliance and security challenges as you move to the cloud.

VMBlog.com

July 30, 2013
Xceedium Announces Privileged User Protection for AWS Cloud Management APIs
VMBlog.com covers Xceedium’s new Xsuite protections for cloud management APIs.

Help Net Security

July 31, 2013
AWS cloud management APIs: Don’t overlook a key security component

VMBlog.com

July 25, 2013
Xceedium Promotes John Suit to Chief Technology Officer

Washington Business Journal

July 24, 2013
People On The Move: John Suit

Talkin' Cloud

July 10, 2013
WPC: Xceedium Cloud Identity Now For Microsoft Office 365

Help Net Security

July 9, 2013
Audit privileged access to Microsoft Online Services

IT-TNA

July 8, 2013
Xceedium Targets Growing Interest In PAM, Microsoft Cloud

Wired

June 19, 2013
Next Generation Privileged Identity Management: What Will It Take?
By: Dale R. Gardner, Xceedium

IT Trends and Analysis

May 15, 2013
Privileged Accounts: What You Don’t Know Can Hurt You

IT Trends and Analysis’s Steve Wexler outlines the risks privileged users can pose to organizations, and talks about ways to mitigate them–including Xceedium’s Ten Best Practices.

FCW

May 8, 2013
Easing into FISMA and FedRAMP? It’s possible.
“Across the federal government, managers are worrying about how to comply with new forthcoming security standards, including the possible reform of the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP), even as their budgets shrink and pressure mounts to incorporate new technologies. While the transition may not be seamless, insiders say it does not have to be the struggle some fear.” Read more…

Cloud Computing Journal

May 3, 2013
Migrating On-Premise Controls to the Cloud
Migrating existing on-premises controls to cloud environments, without considering the unique requirements of the hybrid cloud, can lead to increased risks and compliance failures. Xceedium’s Dale Gardner, director of product marketing, explains more.

Cyber Warnings E-Magazine

April 2013

Identity and the Cloud: Security’s New Perimeter

Xceedium Director of Product Marketing Dale Gardner takes a look at how the move towards utilizing identity as a new security perimeter impacts privileged identity management.

Network World

March 25, 2013
Who Has Responsibility for Cloud Security?
A Network World Roundtable with Shawn Kingsberry, CIO of the Recovery Accountability and Transparency Board; Craig Sutherland, principle architect and engineer, lead associate, Booz Allen Hamilton; Mike Rothman, president, Securosis; and Ken Ammon, chief strategy officer, Xceedium.

Government Security News

Government Security News

December 5, 2012
“Xceedium’s Ken Ammon on Fed Cloud Security Challenges”
More Information

NetworkWorld

NetworkWorld

November 27, 2012
“5 things to watch for at Amazon cloud conference”
More Information

Government Computer News

Government Computer News

September 12, 2012
“Can the Cloud Really Keep a (Government) Secret?”
More Information

Information Week Government

Information Week Government

July 13, 2012
“Federal Agencies Struggle to Meet Cloud Mandate”
More Information

Washington Post

Washington Post

June 17, 2012
“Amazon Spreads Its Web in Washington”
More Information

Washington Post

Washington Post

June 10, 2012
“Dulles Trapezoid Could Be Anchor for Development”
More Information

Beltway Startups

Beltway Startups

June 7, 2012
“Herndon-Based Xceedium Raises $12 Million in New Funding”
More Information

Washington Business Journal

Washington Business Journal

June 6, 2012
“Xceedium Lands $12M in New Financing”
More Information

Talkin Cloud

Talkin Cloud

June 6, 2012
“Xceedium Announces $12M Series B, Xsuite Cloud for AWS”
More Information

Canal Cloud

Canal Cloud

June 6, 2012
“Xceedium Announces $12M Series B, Xsuite Cloud for AWS”
More Information

Cloud News Daily

Cloud News Daily

June 5, 2012
“Xceedium’s Gets $12 Million for Identity Management”
More Information

SMB Nation

SMB Nation

June 5, 2012
“Xceedium’s Xsuite Cloud is Now Available on Amazon Web Services”
More Information

FinSMEs

FinSMEs

June 5, 2012
“Xceedium Closes $12M Series B Financing”
More Information

Dark Reading

Dark Reading

June 5, 2012
“Xceedium Unveils Xsuite Cloud on Amazon Web Services”
More Information

Sand Hill

Sand Hill

June 5, 2012
“Xceedium Obtains $12,000,000 New Financing”
More Information

ITbriefing.net

ITbriefing.net

June 5, 2012
“Xceedium Unveils Xsuite Cloud on Amazon Web Services”
More Information

ITbriefing.net

ITbriefing.net

June 5, 2012
“Xceedium Fuels Growth with $12 Million Financing Round”
More Information

The Wall Street Journal

The Wall Street Journal

June 4, 2012
“Cloud Computing and Other Money-Saving Initiatives”
More Information

Dow Jones & Company, Inc.

Dow Jones & Company, Inc.

June 4, 2012
“Xceedium Gets $12M in Latest Deal in Access Management Sector”
More Information

Washington Post

Washington Post

June 3, 2012
“The Download: Entrepreneur sells his 2-year-old start-up KikScore to Google”
More Information

eWeek

eWeek

September 9, 2011
“Xceedium Acquires Cloakware Password Authority, Launches Xsuite”
More Information

Ottawa Business Journal

Ottawa Business Journal

September 8, 2011
“Xceedium Buys Cloakware Technology, Sets up Shop in Ottawa”
More Information

Washington Business Journal

Washington Business Journal

September 8, 2011
“Xceedium Buys Cloakware Password Business”
More Information

GSN Magazine

GSN Magazine

September 8, 2011
“Xceedium Acquires Cloakware Password Authority Business and Launches Integrated Appliance to Lock-down Network Access”
More Information

Executive Leaders Radio

Executive Leaders Radio

August 30, 2011
“Glenn Hazard, President & CEO at Xceedium first appeared on Executive Leaders Radio”
More Information

InfoWorld

InfoWorld

June 20, 2011
“IT Admins Gone Wild: 5 Rogues to Watch Out for”
More Information

Infosecurity Products Guide

Infosecurity Products Guide

June 14, 2011
“Xceedium GateKeeper Helps Department of Homeland Security Battle Insider Threats and Maintain National Security”
More Information

SearchSecurity.com

SearchSecurity.com

June 7, 2011
“Government Cybersecurity: User-level Security Tools Mitigate Fed Insider Risks”
More Information

TMC InfoTech

TMC InfoTech

June 3, 2011
“Xceedium Names Patrick McBride as VP of Marketing”
More Information

GovConExec

GovConExec

June 3, 2011
“For Your Eyes Only?”
More Information

SC Magazine

SC Magazine

June 2, 2011
“Security Pros Should Trust No One”
More Information

SC Magazine

SC Magazine

June 1, 2011
“Eliminating Trust: The Zero-trust Model”
More Information

SC Magazine

SC Magazine

December 16, 2010
“How the WikiLeaks Crisis Could Have Been Prevented“
More Information

SearchSecurity.com

SearchSecurity.com

May 18, 2011
“Wikileaks Insider Threat: A Lesson for Government Cybersecurity Managers”
More Information

Washington Post

Washington Post

April 17, 2011
“Venture Capitalists Unite Pentagon with Small Companies”
More Information

ZDNet

ZDNet

April 13, 2011
“Trust and Security. How do you Marry the Two?”
More Information

USA Today

USA Today

April 11, 2011
“Averted Government Shutdown Spared Millions of Computer Users, too”
More Information

National Defense Magazine

National Defense Magazine

April 7, 2011
“Pentagon Teams With Venture Capitalists to Recruit New Suppliers”
More Information

IDG News

IDG News

April 6, 2011
“Feds Prep for eGov Shutdown”
More Information

Herndon Connection

Herndon Connection

April 4, 2011
“Week in Herndon: Xceedium Moves Headquarters to Herndon”
More Information

TMCnet.com

TMCnet.com

March 31, 2011
“Xceedium Moves Headquarters to Northern Virginia”
More Information

dcTechSource.com

dcTechSource.com

March 29, 2011
“Cybersecurity Company Moving to DC Area”
More Information

The New Jersey Technology Council

The New Jersey Technology Council

March 28, 2011
“Xceedium Moves Headquarters to Northern Virginia”
More Information

Washington Business Journal

Washington Business Journal

March 28, 2011
“Xceedium Moves to Herndon”
More Information

GSN Magazine

GSN Magazine

March 24, 2011
“Trust & Security: How do you Marry the Two?”
More Information

eWeek

eWeek

March 9, 2011
“University Data Breaches Underscore Need for Employee Security Training”
More Information

BankInfoSecurity.com

BankInfoSecurity.com

February 18, 2011
“In this Podcast, BankInfoSecurity Interviews Xceedium on Privileged Access Control”
More Information

Security Curve Blog

Security Curve Blog

February 17, 2011
“RSA 2011: Day 3 Roundup”
More Information

eWeek

eWeek

February 16, 2011
“Rethinking Access Controls: How WikiLeaks Could Have Been Prevented”
More Information

CRN

CRN

February 15, 2011
“Raise the Shield: 25 Hot New Security Products at the RSA Conference 2011″
More Information

eWeek

eWeek

February 14, 2011
“eWeek Calls Xceedium One of Its 11 Products to Watch at RSA 2011″
More Information

Capital Insider

Capital Insider

February 11, 2011
“Morris Jones Interviews Xceedium’s Chief Strategy Officer on Controlling Privileged User Access”
More Information

Network World

Network World

February 7, 2011
“Products of the Week“
More Information

InformationWeek & Dark Reading

InformationWeek & Dark Reading

February 3, 2011
“Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise“
More Information

DNS Zone

DNS Zone

February 2, 2011
“DNS: Xceedium Augments GateKeeper Appliance”
More Information

CRN

CRN

January 25, 2011
“2011 Need to Know: Security Vendors”
More Information

The New New Internet

The New New Internet

January 25, 2011
“Security Expert: ‘At the Core of Insider Threat is the Discipline of Access Control’”
More Information

eWeek

eWeek

January 14, 2011
“Data Breaches at Arizona Medical Center Makes Case for Zero Trust Security”
More Information

InfoWorld

InfoWorld

January 13, 2011
“The fed goes hunting for malcontents”
More Information

Network World

Network World

January 10, 2011
“Zero trust” is not paranoia; it’s the smart approach to security“
More Information

eWeek

eWeek

January 06, 2011
“White House Memo Sets Goals for Security Review to Forestall Future WikiLeaks“
More Information

Dark Reading

Dark Reading

January 06, 2011
“Obama Administration Post-WikiLeaks Memo Raises Question of ‘Trustworthy’ Users“
More Information

CIO TODAY

CIO TODAY

December 29, 2010
“What Can SMBs Learn from the WikiLeaks Fiasco?“
More Information

Irish Examiner

Irish Examiner

December 18, 2010
“War on WikiLeaks is a Losing Battle“
More Information

Webcast Image

Blog: High Assurance Security for Privileged Identity Management...

Continued security breaches, like the Target and eBay breaches and insider attacks... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More