On Demand Webinar

Why NAC Isn't Enough

Bringing PAM to Network Infrastructure

Join Craig Riddell

VP of Technology and Field CISO at Kron Technologies

For a deep dive into real-world threats paired with a live demo of our solution.

NAC wasn’t built to defend against today’s infrastructure attacks. Modern threats like Salt Typhon exploit gaps in network access—using vulnerabilities like CVE-2023-20198 and CVE-2023-20273 to compromise routers, implant web shells, and maintain persistent access. These attacks succeeded because there was no visibility into SSH key usage and no control over privileged sessions. Traditional NAC and PAM tools weren’t designed to solve this. Kron Network PAM is.

Watch Now

Oops! Something went wrong while submitting the form.

Meet Your Speaker

Craig Riddell

Vice President of Technology and Field CISO, Americas

Craig Riddell is Vice President of Technology and Field CISO, Americas at Kron Technologies. A recognized cybersecurity leader with 15+ years of experience in identity and access management (IAM), privileged access security, and Zero Trust, Craig has helped global enterprises secure critical infrastructure and reduce risk.

He’s a CISSP and Certified Ethical Hacker, known for bridging technical security and business strategy to help organizations strengthen their security posture and drive growth.

CISSP

Certified ethical Hacker

15+ Years Experience

Modern Attack Vectors

How modern attacks exploit gaps in network device access

Enterprise Implementation

How global enterprises use Kron Network PAM to replace shared credentials and meet audit requirements at scale

NAC Limitations

Why NAC falls short after the point of connection

Kron Network PAM Solution

How Kron Network PAM applies 2MFA, command filtering, and session auditing across TACACS, RADIUS and SSH - withouot agents

If you’re responsible for network infrastructure or privileged access, this session delivers what NAC can’t.

Ready to Secure Your Network Infrastructure?

Don't miss this exclusive session. Register now to learn how Kron Network PAM can protect your organization from modern infrastructure attacks.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.