Modern IT infrastructures are diverse and complex. The number of endpoints has greatly increased and the proliferation of remote work means organizations’ security perimeters have been scattered far and wide. The increased prevalence of BYOD (Bring Your Own Devices) policies used by remote employees and third-party contractors has played a major role in threatening corporate security. More BYOD endpoints mean more digital avenues into critical systems that need to be protected.
Balancing BYOD risk with Privileged Access Management
[fa icon="calendar'] May 6, 2020 6:19:47 PM / by WALLIX
The Year of the RAT: Benefit Safely from SaaS and External Collaboration
[fa icon="calendar'] Apr 30, 2020 12:25:24 PM / by Eric Gaudin
You want want your employees to benefit from best-in-class SaaS services, or to use the latest technological equipment. But, you're concerned by the security challenges tied to new technologies, and by the exposure of your infrastructure to external connections. The news is full of stories on recent hacks achieved through external contractor access or illegal access to internal systems.
Identify, Authenticate, Authorize: The Three Key Steps in Access Security
[fa icon="calendar'] Apr 21, 2020 5:17:19 PM / by WALLIX
An engineer is starting her first day at a cybersecurity firm. What is the likelihood that she walks straight into the office without speaking to anyone, then begins accessing information from the nearest workstation?
IdaaS and Access: Don't be kicked out by the VIP bouncer
[fa icon="calendar'] Apr 8, 2020 8:10:07 PM / by Eric Gaudin posted in Improving Cybersecurity
If you're not on the list, you can’t get in.
The Year of the RAT: Don’t let your IT turn into a RAT’s nest
[fa icon="calendar'] Mar 31, 2020 11:41:10 AM / by Eric Gaudin
The first blog of this series established that well-planned cybersecurity is necessary to achieve sustainable protection against the mutating threats that are Remote Access Trojans (RATs). We also identified how local protections through endpoint solutions can effectively contain malware.