Xceedium

Partners - Support - Contact Us

Xceedium News Coverage

Federal News Radio

May 5, 2015

CDM Phase 2 (Audio)

Ken Ammon, the chief strategy officer of Xceedium, told Federal Drive hosts Tom Temin and Emily Kopp what’s in store for phase two of CDM.

Fierce Government IT

April 11, 2015

Seizing the Moment

Dibya Sarkar of Fierce Government IT quotes cybersecurity experts from RAND Corporation, Dell, and Xceedium’s CSO Ken Ammon  in an article focused on how the federal government can and should leverage available cybersecurity strategies in light of the recent cyberattacks on both federal and civilian organizations.

Fierce Government IT

April 7, 2015

Fever Pitch

Dibya Sarkar surveys the current cybersecurity landscape of in the wake of cyber-terrorism, including North Korea’s attack on Sony Pictures Entertainment, which Xceedium’s Ken Ammon calls a digital “Pearl Harbor”.

Federal Times

March 31, 2015

Privileged ID management and the new security perimeter

Ken Ammon, CSO of Xceedium, explains why “Identity must be considered an integral element of security, knit into the fabric of our next generation IT infrastructure” and how to fill the gaping hole in the current security clearance process.

Federal Computer Week

March 5, 2015

The uncertain marriage of CDM and FedRAMP

Sean Lyngaas of FCW reports on hurdles to the seemingly synergistic relationship between CDM and FedRAMP.  Xceedium’s Ken Ammon provides some context on the CDM program.

Signal Magazine

March 1, 2015

DHS Readies Next Phase of Cybersecurity Conformity

Written by Signal’s Sandra Jontz, this article details how the DHS is tackling identity management in CDM Phase 2.  Xceedium’s Ken Ammon helps to explain the history and necessity of the federal overhaul.

Ars Technica

February 27, 2015

Cybergeddon: Why the Internet could be the next “failed state”
Ars Technica’s Sean Gallagher draws disturbing parallels between today’s Internet and late 70’s New York — and now, like then, the feeling is everything could go to hell with just the slightest push. Our Ken Ammon shares his views on how to stave off the potential failure.

Federal Computer Week

February 25, 2015

How (and why) the CIA plans to expand cyber capabilities
In an article by Sean Lyngaas, Xceedium’s Ken Ammon discusses how, and why, the CIA plans to expand its cyber capabilities.

Entrepreneur

February 19, 2015

Expert Advice: How to Up Your Cyber Security

Entrepreneur’s Ann C. Logue speaks with Xceedium’s Ken Ammon to discuss ways companies can protect themselves fro the seemingly never-ending rash of damaging data breaches and thefts of intellectual property. Ken talks about the importance of assessing the security stance of business partners and provides guidance on how best to protect yourself from insider and outsider attacks.

CSO

January 26, 2015

Lack of security in small companies means big risk for the enterprise
CSO’s David Geer explains how small businesses share their vulnerabilities with their larger customers, making it easy to access those networks. Xceedium’s Mo Rosen discusses why hackers use small business networks as a portal to larger, more lucrative targets, ways businesses can push back, and how privileged identity management can be implemented to mitigate risk.

Key Management

Blog: FFIEC Issues Warnings And Guidance Around Credential...

The Federal Financial Institutions Examination Council (FFIEC) has issued a Joint... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More