logo

Martin Cannard

Martin is Vice President of Product Strategy at Netwrix. Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Netwrix, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.
Identity
August 20, 2024

What is Zero Trust?

"Never trust; always verify." That's the philosophy that drives the Zero Trust model, and it represents a major shift from the previous motto: "Trust but verify." As threat actors have become more...
Identity
April 11, 2024

Zero Trust vs. Least Privilege

Zero Trust and the Principle of Least Privilege are security models designed to improve security posture by restricting unnecessary access to systems and data. Both models are a reliable way to...
Identity
March 20, 2024

5 Steps to Auditing Administrator Access Rights

Accounts with administrative and elevated privileges are necessary for both business and IT functions, but they represent a significant risk to your organization. In the hands of a careless or...
Infrastructure
December 18, 2023

Steps to Control Local Admin Rights

IT pros need local admin rights on corporate devices to install software, modify configuration settings, perform troubleshooting and so on. But all too often, business users are also routinely...
Identity
June 2, 2023

Zero Trust: The Case for Just-in-Time Access

Traditional IT security models focused on one thing: keeping the bad guys out the network. Anyone inside the network was physically in the corporate office and logged on to a machine set up and...
Identity
June 2, 2023

Identity Management vs. Access Management

Identity management and access management are often combined into identity and access management (IAM). IAM is intended to improve security by ensuring that only authorized entities (such as people,...
Show more articles