<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

PAM as a State of the Art Security Tool

[fa icon="calendar'] Apr 26, 2017 7:01:44 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Security teams already equipped with SIEM and IDS can go further with Privileged Access Management (PAM), a state of the art security tool that enables auditable logs of administrative sessions.

 

Read More [fa icon="long-arrow-right"]

SOX and Privileged Access Management

[fa icon="calendar'] Apr 19, 2017 12:21:08 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Sarbanes Oxley… aka “SOX.” Wow, is that still a thing? Oh, yes, you can bet your 10K on it.  The law requires publicly traded corporations to document, implement, audit, and certify internal controls over financial reporting. This includes a great deal of attention to IT controls and policies.  Access controls are critical for SOX. As a result, SOX and Privileged Access Management (PAM) are closely linked, or should be.

 

Read More [fa icon="long-arrow-right"]

Privileged Access Management and Vulnerability Systems: Qualys and WALLIX

[fa icon="calendar'] Apr 13, 2017 9:46:09 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Complexity is the enemy of cybersecurity. Yet, it can’t be avoided. Even a relatively small organization will have multiple people operating and administering multiple IT assets while fending off multiple threats. Any problem is basically a problem cubed. How do you keep things secure in that environment?

 

Read More [fa icon="long-arrow-right"]

GDPR and Privileged Access Management (PAM): What International Businesses Need to Know

[fa icon="calendar'] Apr 7, 2017 11:30:32 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

The European Union is on the verge of enacting its new privacy regulations, known as the General Data Protection Regulation (GDPR). Replacing the existing EU data privacy rules, GDPR is simply the latest in a long line of privacy regulations dating back to 1980. While GDPR clarifies and simplifies a number of data protection requirements, it adds new rules that will almost certainly present challenges to international businesses working in the EU.

 

Read More [fa icon="long-arrow-right"]

PAM and Database Security

[fa icon="calendar'] Mar 31, 2017 6:25:51 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security.

 

 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security