<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Risky business: it’s time to talk about third parties

[fa icon="calendar'] Sep 22, 2016 12:09:43 PM / by WALLIX posted in Controlling Third Party Access

[fa icon="comment"] 0 Comments

 

 

The number of security breaches attributed to third parties continues to rise – the IRS was hit by a wave of attacks last year and let’s not forget the infamous Target breach of 2013 that saw 40 million debit and credit card details leaked - yet a PwC Global State of Information Security Survey found that 74% of companies do not even have a complete inventory of all third parties that handle personal data of their employees and customers, are completely unaware that they’re over-sharing data and often don’t even know who officially “owns” the third party relationship.

 

Read More [fa icon="long-arrow-right"]

Privileged Access Management for Dummies III - PAM & IAM

[fa icon="calendar'] Jul 20, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 1 Comment

This third installment of our “PAM for Dummies” series addresses one of the most important security issues you’ve never heard of: the connection between privileged access management (PAM) and identity access management (IAM).

Read More [fa icon="long-arrow-right"]

May The Force Be With You - But More Careful With Your Data

[fa icon="calendar'] Jul 19, 2016 6:00:00 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

We all take it for granted that when we need them, the Police will help "protect and serve" its citizens. But sometimes, only sometimes, they protect and serve themselves with unauthorised insider information about the citizens they are paid to help.

 

Read More [fa icon="long-arrow-right"]

The High Risk Access Management Solution to help IT Operations

[fa icon="calendar'] May 10, 2016 10:29:07 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Wallix Products

[fa icon="comment"] 0 Comments

Being head of IT Operations in a mid-sized or big enterprise is becoming a more and more demanding challenge

 

 

Read More [fa icon="long-arrow-right"]

What is Privileged Access Management (PAM)?

[fa icon="calendar'] Apr 25, 2016 6:39:25 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 3 Comments

 

The key is to get the importance of the word “Privileged.”

A privileged user is someone who has administrative access to critical systems. For instance, the individual who can set up and delete email accounts on Microsoft Exchange Server is a privileged user. The word is not accidental. Like any privilege, it should only be extended to trusted people. Only those seen as responsible can be trusted with “root” privileges like the ability to change system configurations, install software, change user accounts or access secure data. Of course, from a security perspective, it never makes sense to unconditionally trust anyone. That’s why even trusted access needs to be controlled and monitored. And, of course, privileges can be revoked at any time.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security