<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

The right way to SUDO for PAM

[fa icon="calendar'] Oct 11, 2017 4:00:00 PM / by Eric Gaudin

[fa icon="comment"] 0 Comments

SUDO or NOT SUDO. In the PAM industry, both sides have many supporters and with arguments such as: “It’s free but it’s not maintained”. As usual, there is no right or wrong answer, but there is a right way and a wrong way to secure your systems.

 


Read More [fa icon="long-arrow-right"]

Enable secure application-to-application communication

[fa icon="calendar'] Jul 13, 2017 4:43:06 PM / by Eric Gaudin posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

I am not just a standalone application, I also need to communicate with my peers!

 

Read More [fa icon="long-arrow-right"]

Why do you need to build (AD) bridges when there is already a Highway?

[fa icon="calendar'] May 31, 2017 5:48:38 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

Integration between several worlds (Windows; Unix/Linux etc.) often requires several adapted tools. This relates to AD Bridging integration.

 

 

Read More [fa icon="long-arrow-right"]

The Bastion secures your applications with AAPM

[fa icon="calendar'] May 11, 2017 12:30:17 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

The WALLIX Bastion offers AAPM (application-to-application password management) with a fingerprinting proprietary technology to authenticate third party applications.

 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security