<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Expert view: 3 steps to implement Privileged Access Management

[fa icon="calendar'] Feb 7, 2017 5:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 0 Comments

In the world of cybersecurity, privileged access management (PAM) solutions are increasingly attractive for companies and organizations because they protect their most sensitive data and systems from cyber threats. How do you properly implement these solutions? Our expert replies in this exclusive interview. 

 

Read More [fa icon="long-arrow-right"]

PAM and Third Party App Maintenance

[fa icon="calendar'] Jan 12, 2017 2:57:53 PM / by WALLIX posted in Controlling Third Party Access

[fa icon="comment"] 0 Comments

Organizations are increasingly outsourcing the maintenance of applications to third parties. Providers of this type of service range from global giants like IBM and HPE to smaller, specialized firms as well as cloud service providers. There is much to like about the idea of having someone else maintain your applications. It is often less expensive than having in-house staff handle the workload. Plus, you don’t have to be concerned with retaining (or losing) application skillsets in your IT department.

 

Read More [fa icon="long-arrow-right"]

Risky business: it’s time to talk about third parties

[fa icon="calendar'] Sep 22, 2016 12:09:43 PM / by WALLIX posted in Controlling Third Party Access

[fa icon="comment"] 0 Comments

 

 

The number of security breaches attributed to third parties continues to rise – the IRS was hit by a wave of attacks last year and let’s not forget the infamous Target breach of 2013 that saw 40 million debit and credit card details leaked - yet a PwC Global State of Information Security Survey found that 74% of companies do not even have a complete inventory of all third parties that handle personal data of their employees and customers, are completely unaware that they’re over-sharing data and often don’t even know who officially “owns” the third party relationship.

 

Read More [fa icon="long-arrow-right"]

Privileged Access Management for Dummies III - PAM & IAM

[fa icon="calendar'] Jul 20, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

This third installment of our “PAM for Dummies” series addresses one of the most important security issues you’ve never heard of: the connection between privileged access management (PAM) and identity access management (IAM).

Read More [fa icon="long-arrow-right"]

May The Force Be With You - But More Careful With Your Data

[fa icon="calendar'] Jul 19, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

We all take it for granted that when we need them, the Police will help "protect and serve" its citizens. But sometimes, only sometimes, they protect and serve themselves with unauthorised insider information about the citizens they are paid to help.

 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security