Pearl Technology Showcase

Pearl Technology Showcase

TRADESHOW

Pear Technology Showcase

  1. Home
  2. Author archive for: Jared Venson

Date: September 29th, 2025

Peoria Riverfront Museum

222 SW Washington St.

Peoria, IL 61602

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

What to Expect From This Event

Hands-on technology showcase:
Discover world-class AV and cybersecurity products, learn how they integrate seamlessly into your business, and see live demonstrations of intuitive solutions designed to make technology an asset—not a problem.

Peer-to-peer engagement:
Connect directly with IT leaders, solution providers, and Pearl Technology’s expert team. Build lasting relationships while discussing real-world challenges and opportunities with fellow technology professionals.

Event Organizer Details

Pearl Technology has been helping businesses transform technology into a seamless asset for years, with a strong focus on client satisfaction and long-term success. Now in its fifth year, the Central Illinois Cyber & AV Technology Showcase brings together AV and cybersecurity leaders, innovative vendors, and business decision-makers for an afternoon of networking.

Event Booth Giveaway:

Sign up here to win a bottle of whiskey on us! (You must be present at the CyberQP booth to win)

    CyberQP

    Already a Partner?

    CyberQP partners are equipped with their very own Channel Account Manager to ensure that you are optimized and using our solutions to their full capabilities. We offer onboarding, re-implementation, technical support and MDF programs. Schedule some time with your dedicated Partner Success Manager below.

    CyberQP Looks Different Than it Did 3 Months Ago

    CyberQP Looks Different Than it Did 3 Months Ago

    CyberQP Looks Different

    Stronger protection. Smoother workflows. New capabilities built for today’s IT Professionals.

    1. Home
    2. Author archive for: Jared Venson

    Evolving for Tomorrow's Threats.

    In just three months, CyberQP has undergone a major transformation driven by our commitment to give IT professionals tools that don’t just keep up, but stay ahead. By expanding our PAM and EUAM capabilities, together we can close the gaps attackers look for.

    What's New?

    QGuard

    Privileged Access Management

    Global Account Import Policies:

    A feature that simplifies a time consuming tasks for IT professionals, managing account import settings across multiple customers. Admins can now configure standardized account import rules once and apply them across all customer tenants.

    Key Features: 

    • Configure import settings once and apply them globally.
    • Manage both end-user and admin accounts.
    • Apply to Active Directory, Microsoft 365, and local directories.

    Read our Product Release blog.

    What's New?

    Audit Mode for Endpoint Privilege Management:

    A powerful addition that allows IT Professionals to confidently move their customers away from standing local admin rights, without disrupting daily operations or user productivity.

    Key Features:

    • Privileged Activity Audit Log: View all privileged programs and processes run by users across all endpoints.
    • Process Details: Get detailed information for each process, with built-in VirusTotal integration to check for malicious programs.
    • Rule Creation: Easily create auto-elevation rules directly from audit events and easily apply them at scale across your customer and user base.

    Read our Product Release blog.

    QDesk

    End-User Access Management

    End User Elevation

    Simplify Endpoint Privilege Management with Controlled, Temporary Admin Access

    What's New?

    User Elevation: Grant temporary time-based admin access to power users / on prem IT staff for complex tasks that require user context permissions.

    Process Elevation: Authorize only the process, software installation or system configuration change to enforce least privilege.  

    Rules and Auto-Approval Engine: Create new or save previous on-demand elevation requests as rules so future requests can be automatically approved without technician intervention quickly and securely. 

    Just-in-Time Access: Provide admin access only when needed.

    Zero Standing Privilege: Eliminate always-on admin accounts to reduce attack surfaces. 

    Least Privilege: Ensure users have only the access they need, nothing more.

    Automatic Reversion: Permissions automatically reset to standard after use, minimizing lingering security risks.

    Why IT Professionals Choose Us

    Zero Trust Access Management

    CyberQP brings all solutions together in one purpose built platform, giving IT teams a faster, smarter, and more secure way to manage these critical workflows through one pane of glass. Our platform provides secure, elevated access for both IT Professionals and end-users, along with robust self-service and identity verification capabilities.

    See the New CyberQP in Action. Book Your Demo Today

    30-min Platform Overview

    Discover how CyberQP’s Zero Trust Helpdesk Security Platform helps IT teams eliminate standing privileges, verify identities instantly, and align with compliance frameworks like NIST, CIS, and CMMC.

      Enforce Least Privileges Confidently with Audit Mode | CyberQP Product Release

      Enforce Least Privileges Confidently with Audit Mode | CyberQP Product Release

      We’re excited to introduce Audit Mode for Endpoint Privilege Management, a powerful addition that allows IT Professionals to confidently move their customers away from standing local admin rights, without disrupting daily operations or user productivity.

      Key Features:

      • Privileged Activity Audit Log: View all privileged programs and processes run by users across all endpoints.
      • Process Details: Get detailed information for each process, with built-in VirusTotal integration to check for malicious programs
      • Rule Creation: Easily create auto-elevation rules directly from audit events and easily apply them at scale across your customer and user base.
      • Transition to Least Privilege: Confidently remove local admin rights after setting up rules for approved tools.
      • Ad-hoc Elevation Requests: End-users can request one-time admin access or one-time elevation for specific processes when needed.

      Audit Mode allows you to monitor and log every privileged application and process executed by end-users across your managed environments. This added visibility enables IT teams to identify legitimate business-critical tools and workflows in real time. From there, creating precise auto approval rules directly from audit events is easy, and you can ensure that the right programs are always allowed, no help desk ticket required.

      Once all critical applications are accounted for and approved through elevation policies, users can safely remove local admin rights and transition end-users into a secure, policy based elevation model. Combined with integrated VirusTotal scanning, detailed process insights, and support for ad-hoc elevation requests, Audit Mode provides a smooth, strategic path toward implementing least privilege at scale without the operational risk, or end-user friction that typically slows down adoption.

      Why IT Teams Care:

      • Stronger Endpoint Security: Eliminating standing admin rights significantly reduces the attack surface across every customer environment. By only granting privilege to approved applications when needed, it limits the potential for lateral movement and privilege escalation.
      • Easy Adoption: Audit Mode accelerates the rollout of least-privilege policies. Instead of guessing which tools to whitelist, you can use real-time audit data to build elevation rules.
      • Reduces Tickets and Manual Approvals: With audit-driven rule creation and self-service elevation workflows, helpdesks will spend less time fielding tickets.
      • A Foundation for Automation: By logging privileged behavior across all endpoints, Audit Mode helps identify common patterns and proactively define safe, repeatable elevation rules.

      Conclusion: A Critical Step to Achieve Zero Standing Privileges

      Audit Mode isn’t just a new feature, it’s a strategic enabler for IT Professionals looking to implement true least privilege access, without friction.

      Traditionally, the removal of local admin rights has come with a cost: increased support tickets, unhappy end users, and disruption to workflows. Audit Mode flips that narrative by providing visibility into how end-users interact with privileged tools before any restrictions are enforced. This gives you the context needed to build safe, effective elevation strategies that work from day one.

      SentinelOne Breach Reveals Modern Access Risk | CyberQP Blog

      SentinelOne Breach Reveals Modern Access Risk | CyberQP Blog

      When SentinelOne disclosed a breach in mid-2024, it offered a broader insight into today’s cybersecurity challenges: even robust endpoint detection and response (EDR) platforms benefit from complementary access governance layers. The breach, stemming from a misconfigured third-party analytics integration, underscores the vulnerability of sensitive metadata when proper privilege controls are not in place.

      To their credit, SentinelOne responded with transparency and urgency, filing a public SEC 8-K and initiating remediation steps. The incident offers a timely reflection on how privilege creep and unmonitored non-human identities can unintentionally expand an organization’s risk surface.

      When SentinelOne disclosed a breach in mid-2024, it offered a broader insight into today’s cybersecurity challenges: even robust endpoint detection and response (EDR) platforms benefit from complementary access governance layers. The breach, stemming from a misconfigured third-party analytics integration, underscores the vulnerability of sensitive metadata when proper privilege controls are not in place.

      To their credit, SentinelOne responded with transparency and urgency, filing a public SEC 8-K and initiating remediation steps. The incident offers a timely reflection on how privilege creep and unmonitored non-human identities can unintentionally expand an organization’s risk surface.

      Why This Isn’t Just About SentinelOne

      Incidents like this are not uncommon and should not be viewed as exclusive to any one provider or platform. In fact, they reinforce a vital lesson: cybersecurity is a shared, layered effort. SentinelOne remains a trusted and effective EDR solution. But like all tools, it works best when integrated into a broader ecosystem that includes Privileged Access Management (PAM).

      What the Breach Timeline Suggests

      Access Drift Happens

      Over time, permissions tied to a third-party analytics tool expanded beyond their intended scope. Known as privilege creep, this access drift can occur silently, particularly in rapidly growing or complex environments.

      Visibility Challenges

      The exposure likely persisted for some time before being detected. As many IT teams are aware, detecting anomalies—particularly those originating from non-human identities—requires active session monitoring and audit trails, not just endpoint alerts.

      Proactive Access Governance Makes a Difference

      Once the issue was identified, SentinelOne acted quickly to revoke access and reconfigure permissions. These are essential, practical steps that highlight the value of ongoing access reviews and automated lifecycle management.

      The Case for Layering Privileged Access Management

      Solutions like CyberQP’s QGuard and QDesk help organizations layer in proactive identity and access controls alongside endpoint defenses:

      • Just-in-Time Access: Reduce risk by granting temporary access for defined tasks.
      • Credential Rotation: Eliminate standing privileges by continuously updating credentials.
      • Non-Human Identity Controls: Secure and monitor service accounts to ensure their permissions don’t accumulate unchecked.
      • Session Logging & Alerts: Provide the visibility necessary to respond quickly to unusual activity.

      With these controls in place, organizations can prevent access drift and reduce the chance of unintended exposure.

      EDR Is Foundational, Not Final

      EDR is indispensable for detecting threats at the endpoint. SentinelOne excels in this domain. Yet incidents like this highlight the importance of pairing EDR with upstream controls, those that govern who has access in the first place. This is echoed by industry reports from Verizon’s DBIR and guidance from CISA, which emphasize the ongoing prevalence of credential-based breaches.

      Practical Takeaways for IT Teams

      • Augment Your Endpoint Strategy: Layer PAM to manage identities and access with precision.
      • Automate Entitlement Reviews: Regularly audit and expire permissions that are no longer necessary.
      • Monitor Service Accounts Closely: Non-human identities should be part of your zero-trust strategy.
      • Commit to Least Privilege: Enforce it as a principle across the organization, not just for compliance, but for resilience.

      Moving Forward with Confidence

      This incident serves as a shared reminder that no one is immune to access risk, not even security leaders. But with tools like QGuard and QDesk, organizations can reinforce their security stack and minimize exposure.

      Zero Trust Access Management Platform empowers IT teams to implement scalable and user-friendly privilege controls.

      Discover how CyberQP facilitates secure, auditable access across your entire environment.

      Book a demo to see QGuard in action.