<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Equifax Breach: Preventing Data Breaches with Privileged Access Management

[fa icon="calendar'] Sep 20, 2017 11:51:56 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

The Equifax Data breach is one of the largest and most impactful data breaches over the last few years. The breach gave hackers access to over 143 million records.

 

Overview

The basics of the breach in the US, UK, and Canada are well known:

Hackers had access to 143 million records between the months of May and August. Equifax discovered the breach on July 29, but did not disclose it to the public until September 7.

 

Read More [fa icon="long-arrow-right"]

WALLIX Bastion: New Product Offerings

[fa icon="calendar'] Sep 12, 2017 4:18:23 PM / by WALLIX

[fa icon="comment"] 0 Comments

Protecting critical data and systems is a fundamental component of any enterprise or SMB (small and midsize business) security strategy. The best way to protect your organization is by ensuring the security of privileged user accounts using privileged access management (PAM).

Read More [fa icon="long-arrow-right"]

Session Manager | What It Is and Why You Need It

[fa icon="calendar'] Aug 31, 2017 3:05:11 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

A session manager works in conjunction with an access manager and password manager, to ensure that critical information is only accessible to specific users.

 

Read More [fa icon="long-arrow-right"]

Privileged User Monitoring: Why Continuous Monitoring is Key

[fa icon="calendar'] Aug 18, 2017 10:53:42 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Understanding what is going on within your organization’s network is a critical component of strong security operations. Organizations must have clear insight into who is accessing critical systems and data, whether it is a trusted insider, 3rd-party provider, automated-user, or external hacker. Monitoring and recording these actions is the best way to ensure security best practices within your company.

Read More [fa icon="long-arrow-right"]

The Dangers of Privilege Escalation

[fa icon="calendar'] Aug 11, 2017 3:46:51 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Threats no longer originate just from your network perimeter – the majority of cyberattacks today are due to privilege escalation that occurs inside the heart of your systems where your precious data lives. 

 

 

Read More [fa icon="long-arrow-right"]