ThycoticCentrify Strengthens Just-In-Time Privilege Elevation for Vulnerable Workstations

Often, attackers seek to gain initial access to critical infrastructure by simply logging in and escalating their privilege to move laterally across distributed and decentralized networks.