<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Deloitte Breach: A Lesson in Privileged Account Management

[fa icon="calendar'] Oct 13, 2017 12:19:32 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Another day, another major data breach uncovered at a high-profile company. Deloitte has recently announced that malicious outsiders infiltrated their email database and gained access to everything it contained, including confidential emails, attachments, IP addresses, login information, and more. 

Read More [fa icon="long-arrow-right"]

SWIFT Framework: SWIFT security and PAM

[fa icon="calendar'] Oct 6, 2017 4:07:01 PM / by WALLIX

[fa icon="comment"] 0 Comments

The Society for Worldwide Interbank Financial Telecommunication (SWIFT), the global banking information network, facilitates over $5 trillion in bank transfers every day. It therefore presents an extremely high value target for cyber-attackers.  

 

Read More [fa icon="long-arrow-right"]

Maintaining Visibility Over Remote Access with Session Management

[fa icon="calendar'] Oct 2, 2017 2:39:02 PM / by WALLIX

[fa icon="comment"] 0 Comments

Remote access is no longer an “option” for organizations, it is a necessity for both IT and business operations. Remote access is required by your own employees and third-party service providers like software vendors, support teams, and consultants.

Read More [fa icon="long-arrow-right"]

Equifax Breach: Preventing Data Breaches with Privileged Access Management

[fa icon="calendar'] Sep 20, 2017 11:51:56 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

The Equifax Data breach is one of the largest and most impactful data breaches over the last few years. The breach gave hackers access to over 143 million records.

 

Read More [fa icon="long-arrow-right"]

WALLIX Bastion: New Product Offerings

[fa icon="calendar'] Sep 12, 2017 4:18:23 PM / by WALLIX

[fa icon="comment"] 0 Comments

Protecting critical data and systems is a fundamental component of any enterprise or SMB (small and midsize business) security strategy. The best way to protect your organization is by ensuring the security of privileged user accounts using privileged access management (PAM).

Read More [fa icon="long-arrow-right"]