<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Securing DevOps in the Cloud with Privileged Access Management (PAM)

[fa icon="calendar'] Dec 7, 2018 6:18:07 PM / by WALLIX posted in Cloud Security

[fa icon="comment"] 0 Comments

A recent cybersecurity news item should trigger concern for anyone involved in cloud-based software development. As reported in CSO, an attacker breached a popular Node.js module. After building trust and gaining owner-level access, he or she was able to push a compromised version that hid Bitcoin and Ethereum hot wallet credentials for malicious purposes in the code.

Read More [fa icon="long-arrow-right"]

Utilizing Privileged Access Management (PAM) to Combat Multi-Tenant Environment Risks

[fa icon="calendar'] Nov 28, 2018 11:01:37 AM / by WALLIX

[fa icon="comment"] 0 Comments

Multi-tenancy, which involves the sharing of infrastructure, software, and network assets by more than one entity, is the predominant mode of computing in the cloud. There are good reasons for this. A multi-tenant environment is more efficient than alternative approaches like assigning each system its own individual machine. Cloud Service Providers (CSPs) host multiple companies' IT resources at once, providing each with cost savings compared to self-hosting all resources on-premise.

Read More [fa icon="long-arrow-right"]

The Forrester Wave™ | WALLIX Recognized Among Top PIM Vendors

[fa icon="calendar'] Nov 14, 2018 4:58:30 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 2 Comments

WALLIX makes its debut in The Forrester Wave™: Privileged Identity Management, Q4 2018, which evaluated the “11 providers that matter most.”

Read More [fa icon="long-arrow-right"]

Utilizing Session Management for Privileged Account Monitoring

[fa icon="calendar'] Oct 31, 2018 10:34:51 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 2 Comments

Maintaining visibility and protecting an organization’s most critical data and systems are central components of robust security operations. Privileged users present a unique risk to companies, whose credentials may get into the wrong hands, resulting in devastating consequences. To maintain the level of visibility and control required for numerous compliance regulations, many organizations look toward session management solutions to provide them with the tools they need to ensure proper security 24/7.

Read More [fa icon="long-arrow-right"]

What is PAM? | Privileged Access Management

[fa icon="calendar'] Oct 18, 2018 10:08:06 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Privileged access management, or PAM, is software that helps organizations maintain complete control and visibility over their most critical systems and data. A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in case of a security breach.

Read More [fa icon="long-arrow-right"]