<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Improving Cloud Security Using Privileged Access Management (PAM)

[fa icon="calendar'] Mar 6, 2018 8:59:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

More and more organizations are making the jump to the cloud in an effort to simplify IT and business management. Although this move can make it easier for organizations to scale operations and have more agility to evolve based on the market, it leaves them vulnerable to an ever-growing range of cyber threats. In order to reap the benefits of utilizing cloud environments while protecting organizations from attack, teams need Privileged Access Management (PAM).

Read More [fa icon="long-arrow-right"]

5 Reasons Privileged Account Discovery Is the First Step Toward Robust Cybersecurity

[fa icon="calendar'] Feb 27, 2018 8:45:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Hikers have a saying that goes, “The terrain is not the map.” Upon finding, for instance, that a bridge no longer exists, one might ask, “Wait a minute… you mean a US Geological Survey map from 1953 doesn’t reflect current conditions?” “Yup. The terrain is not the map.” So it goes in IT as well.

Read More [fa icon="long-arrow-right"]

Thought Leaders Speak: Be secure by combining simplicity with a robust cybersecurity solution

[fa icon="calendar'] Feb 20, 2018 9:01:00 AM / by WALLIX posted in Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

“Simplicity is the ultimate sophistication.” ~ Leonardo da Vinci

Take it from Leonardo (Not DiCaprio. The other one.) Simplicity makes a work of art that much more sophisticated and beautiful. The same is true in technology. Simplicity is elegant. Simplicity sells. Simplicity also makes for effective security.  Indeed, the IT world has only grown more overwhelming since the noted security expert Bruce Schneier remarked in 2001, “Complexity is the enemy of security. As systems get more complex, they get less secure.”

Read More [fa icon="long-arrow-right"]

Meeting Compliance Regulations Using Privileged Access Management (PAM)

[fa icon="calendar'] Feb 13, 2018 11:15:00 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Cybersecurity is a top concern for organizations across the globe. As a result, more and more compliance regulations and laws are being put in place, but meeting these strict rules can be a challenge for organizations. In some cases, security teams may need to comply with multiple regulations based on their geographic location. They need a way to meet compliance without interrupting operations or impacting day-to-day tasks.

Read More [fa icon="long-arrow-right"]

Implementing the NIST Cybersecurity Framework with PAM

[fa icon="calendar'] Feb 12, 2018 11:11:52 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

The National Institute of Standards and Technology (NIST) publishes the Framework for Improving Critical Infrastructure Cybersecurity.

Read More [fa icon="long-arrow-right"]