SecureLink Recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management
SecureLink, the leader in vendor privileged access management, this week announced it was named a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. Gartner defines Privileged Access Management as technologies that help organizations provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access.
“We think being named a Gartner Peer Insights Customers’ Choice for Privileged Access Management validates the commitment our team has to delivering a product specifically built to address the challenges companies face with managing privileged access for third-party vendors,” said Joe Devine, CEO of SecureLink. “The feedback shared by our customers on Gartner Peer Insights is invaluable and helps us execute on our product roadmap to meet market requirements.”
According to Gartner’s “Magic Quadrant for Privileged Access Management”1 report published December 3, 2018, “Privileged access management is one of the most critical security controls, particularly in today’s increasingly complex IT environment. Security and risk management leaders must use PAM tools in a long-term strategy for comprehensive risk mitigation.”
SecureLink holds a unique place in the PAM ecosystem with its purpose-built security and audit capabilities for managing vendor remote access and users. SecureLink has technology integrations with the largest PAM providers to give customers of both solutions enhanced capabilities, including greater granular command filtering, endpoint security and advanced credential management capabilities.
Gartner Peer Insights documents customer experience through verified ratings and peer reviews from enterprise IT professionals. As of March 19, 2019, SecureLink reviews include the following:
“SecureLink is a wonderful tool to allow vendors to have access into our network. It allows us to clearly define who can access internal resources and to what level of access the vendor receives.” Healthcare customer.
“The product allows us to micro-manage vendor/consultant access into our systems. It records what they do when they do it.” Retail customer.
“Implementing SecureLink was critical to our ability to meet HIPAA and HITECH Act requirements including individual accountability and robust audit trails. We have also leveraged the SecureLink robot to meet medical device regulatory requirements.” Healthcare customer.
source securelink

Latest Jobs
-
- SailPoint Integration Consultant
- Unknown
- Upto £75000 plus benefits
-
SailPoint Integration Consultant. SailPoint Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced SailPoint Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of Sailpoint domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex Sailpoint deployments.
-
- CyberArk Integration Consultant
- Greater London
- upto 75,000 plus benefits
-
CyberArk Integration Consultant. CyberArk Integration Consultant is needed for this expanding service business to help them with complex deployment with their FTSE focused customer base. They are looking for experienced CyberArk Integration Consultants who have: • Strong solution designing experience with in depth understanding of IAM concepts and thorough understanding of CyberArk domain. • Thorough understanding of Identity and Access Governance concepts • Leading and creating Identity & Access Management (IAM) technical architecture • Secure by Design principles in Identify Access management, Privilege Access management • Familiar with cloud architectures, data management and source control from a security perspective. This is a great opportunity to join a business that is growing and looking for individuals who want to grow and develop and work on some of the most complex CyberArk deployments.
-
- Penetration Tester, UK based. Ability to achieve SC clearance
- United Kingdom
- 55000
-
Experienced Penetration tester- UK based with the ability to achieve SC clearance. On-going training and development and paid certifications / renewals. Interested to hear from all areas of penetration testing, web app, infrastructure, mobile, etc. MUST have current hands on experience delivering penetration testing. Ideally from a consultancy background with experience working with multiple clients. OSCP / CREST / CHECK / Tigerscheme penetration testing experience / certifications desirable. Apply today for more details. All information kept in the strictest of confidence.
-
- Senior Data Privacy Specialist, London. CIPT
- London
- 60000
-
REF CH7875 £60,000 Senior Data Privacy Specialist, London. CIPT Senior Data Privacy Specialist needed to help advise client on project and programmes relating to Data Privacy and compliance. UK based role. Ideally looking for someone that has a strong appreciation of technology and Data Privacy that can work with clients to develop or enhance their strategies, policies, processes and techniques to manage cybersecurity risks while enabling business driven data. Certified Information Privacy Technologists (CIPT), Certified Information Privacy Professional/Europe CIPP/E experience and or certification highly desirable. Specific experience within the healthcare industry is of particular interest. All details kept in confidence Apply today for more information