<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

External Providers: Connecting through a Bastion? Here's why PAM is your friend

[fa icon="calendar'] May 9, 2018 2:13:04 PM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

Maintain a relationship of mutual confidence with your customer

As an external provider of IT services, whether you are ensuring the remote maintenance of critical equipment or managing a part, or the totality of a client's IT infrastructure, transparency is crucial.

Not only should you provide best-in-class technical services in a timely manner, but you must also comply with security and regulations, control and defend your costs, and you have to provide a high level of process and quality.

Because let’s face it, if a single thing goes wrong, each and every action you take will be under scrutiny.

Read More [fa icon="long-arrow-right"]

Will you survive your next security audit?

[fa icon="calendar'] Apr 3, 2018 2:04:03 PM / by Eric Gaudin posted in Preventing Insider Threat, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

A security audit is something that every single company with an internet connection, and that handles customer/individual data should be concerned with. Without elaborating more than necessary, recent regulations makes it, if not mandatory, at least strongly recommended to audit your IT security to ensure compliance.

Read More [fa icon="long-arrow-right"]

WAB is dead, long live the Bastion 6.0

[fa icon="calendar'] Feb 8, 2018 2:27:54 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

New year, new version for the long-awaited version: the Bastion 6.0.

Read More [fa icon="long-arrow-right"]

Discover Privileged Accounts with WALLIX Discovery

[fa icon="calendar'] Feb 1, 2018 10:05:00 AM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

Do you really know who is wandering on your network?

Read More [fa icon="long-arrow-right"]

Understanding the Uber hack with Privileged Access Management (PAM)

[fa icon="calendar'] Nov 29, 2017 4:08:56 PM / by Eric Gaudin posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

  • The data of 57 million users has been stolen from Uber.
  • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data.
Read More [fa icon="long-arrow-right"]