<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

12 IT Security Questions You Should Be Asking

[fa icon="calendar'] Jun 20, 2018 9:00:00 AM / by Elizabeth Vincent posted in Reaching IT Compliance, Improving Cybersecurity

[fa icon="comment"] 0 Comments

When it comes to the IT security of your organization, you don’t want to leave anything to chance. These days, the vast majority of businesses worldwide are subject to cyber attack (upwards of 89%, in fact). You can’t risk making it any easier for your critical data to be accessed and stolen.

Read More [fa icon="long-arrow-right"]

Robust Privileged Identity Management Using Session Management

[fa icon="calendar'] Jun 12, 2018 10:51:41 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

Ensuring security across organizations is complicated. Between securing the perimeter, enforcing password policies, and attempting to stop breaches before they occur, there is a lot that needs to be considered. Implementing robust privileged identity management through advanced session management tools is one of the key steps to improving organizational security.

Read More [fa icon="long-arrow-right"]

WALLIX Access Manager 2.0: Grant external access without compromising your security

[fa icon="calendar'] Jun 4, 2018 11:06:41 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

With a new Bastion comes a new Access Manager. After the release of the Bastion 6.0 in February, the WALLIX team is very pleased to announce the new Access Manager 2.0.

Read More [fa icon="long-arrow-right"]

New Rules for Privileged Access Management (PAM)

[fa icon="calendar'] May 30, 2018 10:47:23 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

After a trying day at the Security Operations Center (SOC), a Privileged Access Management (PAM) super-admin just wants to have a nice cup of tea and a few minutes relaxing in front of the television before turning in for the night. But, as he dozes and slips into an InfoSec fever dream, he desperately seeks entertainment, flipping through the channels, returning again and again to the classic “New Rules” segment of “Real Time with Bill Maher.”

Read More [fa icon="long-arrow-right"]

Compliance Deadlines: GDPR, NIS Directive & Future Cybersecurity Regulations

[fa icon="calendar'] May 23, 2018 9:02:00 AM / by Elizabeth Vincent posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

 Time’s up! Cybersecurity compliance is no longer optional for global businesses as IT standards and regulations increase at both state and industry levels, worldwide.

Read More [fa icon="long-arrow-right"]