<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Azure Security Monitoring and Privileged Access Management (PAM)

[fa icon="calendar'] Apr 17, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Microsoft Azure offers broad, exciting new capabilities for enterprise IT. The new Azure IoT Hub, which enables large-scale deployment of Internet of Things devices, is just one example. The IoT Hub, however, presents a number of challenges, such as security monitoring on Azure.

Read More [fa icon="long-arrow-right"]

Cloud Password Management with PAM

[fa icon="calendar'] Apr 5, 2018 11:01:22 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Confidence in cloud security is growing. According to the Ponemon Institute’s 2018 Global Cloud Data Security Study, the percent of IT managers who feel that it is difficult to secure confidential or sensitive information in the cloud has fallen from 60% in 2016 to 49% today. That trend notwithstanding, many in the industry still feel cloud security is difficult to achieve. The same study reveals that 71% of IT managers believe is more difficult to apply conventional information security in the cloud computing environment, while 51% think it is more difficult to control or restrict end-user access.

Read More [fa icon="long-arrow-right"]

Picking a PAM Solution

[fa icon="calendar'] Mar 28, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Imagine a hacker is lurking inside your network. Indeed, it’s likely a few malicious actors are already inside your domain despite your best efforts to keep them away. Now, imagine the hacker stealing the credentials of a trusted system administrator. With the back-end access permitted to this privileged user, imagine the kind of damage the hacker can do.

Read More [fa icon="long-arrow-right"]

Addressing MSSP Cybersecurity Challenges with Privileged Access Management

[fa icon="calendar'] Mar 20, 2018 11:58:25 AM / by WALLIX posted in Controlling Third Party Access, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Outsourcing of security is on the rise. The MSSP business grew into a $9 billion category in 2017, and Gartner reports that over 50% of organizations will be outsourcing some or all of their security work to Managed Security Service Providers (MSSPs) by next year. 

Read More [fa icon="long-arrow-right"]

Strengthening Cyber Resilience Through Privileged Access Management

[fa icon="calendar'] Mar 15, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Cyber resilience refers to how well an organization can recover from a cyber incident. Many factors contribute to success with cyber resilience, but any attempt to achieve cyber resilience should prominently feature Privileged Access Management (PAM).

Read More [fa icon="long-arrow-right"]