Remediant

Remediant

Remediant helps enterprises protect their privileged accounts from misuse and abuse.

  • Edit
Get premium to view all results
DateInvestorsAmountRound
-investor investor investor

€0.0

round
investor investor

€0.0

round
N/A

€0.0

round
*

N/A

Acquisition
Total Funding000k
Notes (0)
More about Remediant
Made with AI
Edit

Remediant, founded in 2013 by Paul Lanzi and Timothy Keeler, operates in the Privileged Access Management (PAM) sector of the cybersecurity market. The founders' journey began during their decade of work in the IT departments of biotechnology firms like Genentech, Roche, and Gilead Sciences. There, they experienced firsthand the shortcomings of legacy PAM solutions in combating state-sponsored cyber threats, which inspired the creation of Remediant to address the widespread issue of uncontrolled privileged access in corporate networks.

The company's core business revolves around providing software that prevents data theft stemming from stolen credentials, a primary attack vector in security breaches. It primarily serves small to medium-sized businesses, with clients in sectors including media, biotech, finance, healthcare, and defense. Revenue is generated through a per-device pricing model for its software. A significant milestone for Remediant was securing a Series A funding round of $15 million in 2019, co-led by Dell Technologies Capital and ForgePoint Capital, which followed a period of substantial growth. In a key strategic development, Remediant was acquired by cybersecurity firm Netwrix in December 2022 to enhance Netwrix's PAM offerings.

Remediant's flagship product was SecureONE, which is now offered as Netwrix Privilege Secure for Discovery. This platform is engineered to address the problem of privileged access sprawl, where numerous administrator-level accounts exist across a network, often without oversight. A core feature of the service is its agent-less and vault-less architecture, which simplifies deployment and reduces costs compared to traditional PAM systems. The software continuously scans an organization's network to discover all accounts with administrative privileges. It operates on a Zero Standing Privilege (ZSP) model, removing all constant, unnecessary administrative access. Instead, it implements Just-in-Time Administration (JITA), where access is granted to users on-demand, for a limited duration, and requires multi-factor authentication. This approach minimizes the attack surface by rendering stolen credentials useless outside of the brief, approved access window.

Keywords: Privileged Access Management, PAM, Zero Standing Privilege, ZSP, Just-in-Time Administration, JITA, Netwrix, cybersecurity, credential theft, lateral movement prevention, access control, identity security, SecureONE, Paul Lanzi, Timothy Keeler, endpoint security, continuous monitoring, access discovery, privileged account security, IT security, network security, data breach prevention, enterprise security, Zero Trust

Analytics
Unlock the full power of analytics with a premium account
Track company size and historic growth
Track team composition and strength
Track website visits and app downloads

Tech stack

Group
Tech stackLearn more about the technologies and tools that this company uses.
Book a Demo