As the DHS approves SLCGP funding, we stand ready to discuss your objectives around how to use Privileged Access Management (PAM) to bolster your security posture.
The deadline to request grant dollars allocated under the State and Local Cybersecurity Grant Program was 11/15/2022. The SLCGP will provide $1 billion in funding to SLT partners over four years to support their cyber risk reduction efforts. This program appropriated $185 million for FY22, $400 million for FY23, $300 million for FY24, and $100 million for FY25. See this FAQ for more information.
Download our presentation to learn how BeyondTrust and PAM map to grant program elements.
This presentation includes:
Securely reveal privileged accounts and credentials in your environment in minutes—for free. No installation necessary.
Understanding your privileged access security challenges is a crucial step for organizations. Objectives including risk management, threat mitigation, zero trust security, and cyber insurance qualification depend on privileged account security.
Stolen privileged credentials or compromised remote access tools are used in nearly every data breach. Use the Privileged Access Discovery Application to run unlimited scans—on up to 1,000 network targets at a time. Shine a light on vulnerable accounts, credentials, and tools living on your network. Then, apply that information to correct privileged access, eliminate orphaned accounts, address poor password hygiene, and mitigate other privilege-related vulnerabilities.
View the full scope of your privileged accounts: the number of credentials, password ages, service accounts, and users running with admin rights.
Discover which remote access tools are being used—and could become a backdoor threat.
Generate a report that displays the most urgent privileged account security risks on your network.
The Privileged Access Discovery Application produces an overview report of the privileged activity within your organization. Inside, you’ll gain new insight into the systems on your network, including privileged accounts, SSH keys, services, and remote access tools—pinpointing where your biggest security challenges lie. Check out an example of a summary report.
We look forward to discussing your plans and objectives and how this grant can be used to improve your cybersecurity posture. If there are partners or integrators that you are working with on existing cybersecurity initiatives, we are happy to share content and work alongside them in your pursuit of grant awards.