logo

Martin Cannard

Martin is Vice President of Product Strategy at Netwrix. Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Netwrix, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.
Identity
April 11, 2024

Zero Trust vs. Least Privilege

Zero Trust and the Principle of Least Privilege are security models designed to improve security posture by restricting unnecessary access to systems and data. Both models are a reliable way to...
Identity
March 20, 2024

5 Steps to Auditing Administrator Access Rights

Accounts with administrative and elevated privileges are necessary for both business and IT functions, but they represent a significant risk to your organization. In the hands of a careless or...
Infrastructure
December 18, 2023

Steps to Control Local Admin Rights

IT pros need local admin rights on corporate devices to install software, modify configuration settings, perform troubleshooting and so on. But all too often, business users are also routinely...
Identity
June 2, 2023

Zero Trust: The Case for Just-in-Time Access

Traditional IT security models focused on one thing: keeping the bad guys out the network. Anyone inside the network was physically in the corporate office and logged on to a machine set up and...
Identity
June 2, 2023

Identity Management vs. Access Management

Identity management and access management are often combined into identity and access management (IAM). IAM is intended to improve security by ensuring that only authorized entities (such as people,...
Identity
September 23, 2021

What is Zero Trust?

Introduction to Zero Trust Zero Trust is a security model — a strategy for protecting an organization’s IT assets, including data, services, and applications. Founded in research more than a...
Show more articles