<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

What is PAM? | Privileged Access Management

[fa icon="calendar'] Oct 18, 2018 10:08:06 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Privileged access management, or PAM, is software that helps organizations maintain complete control and visibility over their most critical systems and data. A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in case of a security breach.

Read More [fa icon="long-arrow-right"]

Bring a Privileged Access Management Policy to Life

[fa icon="calendar'] Oct 3, 2018 9:00:00 AM / by WALLIX

[fa icon="comment"] 0 Comments

There’s a misconception in the popular imagination that cybersecurity is a technology-driven discipline. It is technological, of course, but cybersecurity policies are arguably just as important, if not more so, than the hardware and software elements they govern. Policies, or rules, determine how security technology is to be deployed by affected teams. A firewall may prevent unauthorized entry, for instance, but it is useless if there are no rules governing who is allowed to modify its settings.

Read More [fa icon="long-arrow-right"]

Enterprise Password Management Software: WALLIX Bastion Password Manager

[fa icon="calendar'] Sep 26, 2018 9:09:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Organizational security often begins with password management. Even the most basic of organizations use passwords to protect email accounts and document management solutions, while larger organizations may need to worry about HIPAA compliance, protecting industrial control systems, and more. Ensuring security with robust password management policies is key, and utilizing enterprise password management software, such as the WALLIX Bastion Password Manager, significantly simplifies this daunting task.

Read More [fa icon="long-arrow-right"]

Cost of a Data Breach vs. Cost of a Security Solution

[fa icon="calendar'] Sep 19, 2018 10:19:46 AM / by WALLIX posted in Optimizing Cyber-Insurance, Mitigating External Attacks

[fa icon="comment"] 0 Comments

You can’t spend your way into a strong security posture. Being secure involves integrating tools, policies, people, and budgets. Getting secure will absolutely require some expenditure of cash. How much is the right amount? The answer depends on each organization’s unique security needs. In general, though, the best practice is to assess the potential financial impact of an incident (data breach cost) and weigh it against the cost of staying secure through breach prevention. Figuring this out can be a bit challenging, but it can be done.

Read More [fa icon="long-arrow-right"]

How PAM Enables IEC 62443 Implementation

[fa icon="calendar'] Sep 11, 2018 9:03:00 AM / by WALLIX

[fa icon="comment"] 0 Comments

The IEC 62443 standard is a sprawling, highly complex collection of cybersecurity standards addressing the unique needs of Industrial Automation and Control Systems (IACSs). It covers the full spectrum of security, from risk analysis through the definition and implementation of security policies for IACSs. As with most security standards, the issues of user access control and identity management are critical to success. In particular, an organization seeking to be certified for complying with the IEC 62443 standard should address the matter of Privileged Access Management (PAM). PAM relates to administrative, or privileged, users who can set up or modify the IACS elements that are being secured through the standard.

Read More [fa icon="long-arrow-right"]