<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

PAM for Financial Services: Preventing Cyber-Attacks in Finance

[fa icon="calendar'] Nov 20, 2017 2:42:53 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

All organizations understand the need to have strong cybersecurity measures in place to protect personal and corporate data. Financial services, in particular, have an increased need for advanced security with both money and personal data at risk. 

Read More [fa icon="long-arrow-right"]

Understanding the Importance of Privileged Access Management (PAM)

[fa icon="calendar'] Nov 15, 2017 4:53:28 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

We recently published a paper about the role of Privileged Access Management (PAM) in the ISO 27001 standard. ISO 27001 is the world’s most comprehensive and recognized Information Security Management System (ISMS) framework. 

Read More [fa icon="long-arrow-right"]

Gartner Market Guide for Privileged Access Management Report: WALLIX Recognized as a Representative Vendor

[fa icon="calendar'] Nov 3, 2017 10:32:07 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Privileged access management (PAM) is becoming an increasingly important aspect of security infrastructure for organizations of all sizes. Many recent breaches including the Equifax breach and Deloitte breach could have both been prevented if these organizations had a PAM solution in place.

Read More [fa icon="long-arrow-right"]

PAM, SIEM, and SAO: Leveraging Cybersecurity Tools to Move the Needle on Alert Management

[fa icon="calendar'] Nov 2, 2017 3:41:50 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Every cybersecurity operation is like NORAD, the command post where the US Air Force “opens up one eager eye, focusing it on the sky…” as the German singer Nena put it in her 1980s classic “99 Red Balloons.” Instead of watching for 99 red balloons, we’re looking at alerts, an endless, massive flood of security alerts—more than 10,000 per day for most organizations.

Read More [fa icon="long-arrow-right"]

CIS Critical Security Controls: The Role of PAM

[fa icon="calendar'] Oct 17, 2017 4:00:00 PM / by WALLIX

[fa icon="comment"] 0 Comments

The Center for Internet Security (CIS), the non-profit whose mission is to "enhance the cyber security readiness and response of public and private sector entities,” publishes “The CIS Critical Security Controls for Effective Cyber Defense.” 

Read More [fa icon="long-arrow-right"]