<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Enterprise Password Vaults are NOT ENOUGH. You need Session Management

[fa icon="calendar'] Dec 15, 2016 2:18:45 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Password vaults are an important part of locking down your privileged accounts. However, they are not sufficient for ensuring either the security or the auditability of those privileged accounts. While password vaults prevent direct root access to your devices, applications, and systems… password vaults by themselves do not provide either visibility or control over privileged user actions. This requires robust session management.

 

Read More [fa icon="long-arrow-right"]

Why You Want Splunk-PAM integration

[fa icon="calendar'] Nov 29, 2016 3:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Let’s explore the generic advantages of integrating SIEM with PAM, and look at the specific integration of Splunk with the Wallix AdminBastion (WAB) Suite.

 

Read More [fa icon="long-arrow-right"]

Wallix AdminBastion Suite: a key element in Industrial Control Systems security

[fa icon="calendar'] Oct 11, 2016 7:19:12 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

For Industrial Control Systems, often described as Supervisory Control and Data Acquisition (SCADA), availability and safety are the two top priorities. However, security has now become a major issue and therefore must not be ignored.

 


Read More [fa icon="long-arrow-right"]

Privileged Accounts - Prime Targets At Privileged Brands

[fa icon="calendar'] Sep 28, 2016 4:50:10 PM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

 

It seems the bigger the brand, the bigger the challenge for external threats to win brownie points amongst their peers. External threats are taking up the challenge to break through the perimeter and target highly prized privileged accounts that often exist on networks in unprotected Word or Excel documents. With access to these accounts a compromise becomes that much easier.

Read More [fa icon="long-arrow-right"]

UK sees 14 percent increase in local government data breaches

[fa icon="calendar'] Sep 6, 2016 10:58:05 AM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

Despite global IT security spending peaking in 2016 at $81billion which represents a 7.9 percent increase on 2015, local government organisations in the UK have seen a 14 percent increase in the number of reported data breaches. Local government was second only to the UK health sector when measured by the total number of reported data breaches.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security