<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

What is the Principle of Least Privilege and How Do You Implement It?

[fa icon="calendar'] Jan 22, 2019 12:27:05 PM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity

[fa icon="comment"] 2 Comments

In the military, they have a well-known phrase that happens to succinctly describe the definition of the least privilege principle: ‘Need-To-Know Basis’. For the military, this means that sensitive information is only given to those who need that information to perform their duty. In cybersecurity, it’s much the same idea. The ‘least privilege’ principle involves the restriction of individual user access rights within a company to only those which are necessary in order for them to do their job. By the same token, each system process, device, and application should be granted the least authority necessary, to avoid compromising privileged information.

Read More [fa icon="long-arrow-right"]

2018 Breaches: How PAM Could Have Helped Prevent the Worst of Them

[fa icon="calendar'] Dec 27, 2018 3:30:21 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

There have been quite a few security breaches to hit the news in 2018. As each story broke, it seemed like it couldn't get worse, only to find that the next data breach was just around the corner, and even more severe, exposing the data of millions of customers worldwide. We have had a few of those this year.

Read More [fa icon="long-arrow-right"]

WALLIX is positioned in Gartner’s first Magic Quadrant for PAM

[fa icon="calendar'] Dec 18, 2018 6:29:36 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 3 Comments

WALLIX is positioned in Gartner’s first Magic Quadrant for Privileged Access Management (PAM)

Read More [fa icon="long-arrow-right"]

Securing DevOps in the Cloud with Privileged Access Management (PAM)

[fa icon="calendar'] Dec 7, 2018 6:18:07 PM / by WALLIX posted in Cloud Security

[fa icon="comment"] 0 Comments

A recent cybersecurity news item should trigger concern for anyone involved in cloud-based software development. As reported in CSO, an attacker breached a popular Node.js module. After building trust and gaining owner-level access, he or she was able to push a compromised version that hid Bitcoin and Ethereum hot wallet credentials for malicious purposes in the code.

Read More [fa icon="long-arrow-right"]

Utilizing Privileged Access Management (PAM) to Combat Multi-Tenant Environment Risks

[fa icon="calendar'] Nov 28, 2018 11:01:37 AM / by WALLIX

[fa icon="comment"] 1 Comment

Multi-tenancy, which involves the sharing of infrastructure, software, and network assets by more than one entity, is the predominant mode of computing in the cloud. There are good reasons for this. A multi-tenant environment is more efficient than alternative approaches like assigning each system its own individual machine. Cloud Service Providers (CSPs) host multiple companies' IT resources at once, providing each with cost savings compared to self-hosting all resources on-premise.

Read More [fa icon="long-arrow-right"]