<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Meeting Compliance Regulations Using Privileged Access Management (PAM)

[fa icon="calendar'] Feb 13, 2018 11:15:00 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Cybersecurity is a top concern for organizations across the globe. As a result, more and more compliance regulations and laws are being put in place, but meeting these strict rules can be a challenge for organizations. In some cases, security teams may need to comply with multiple regulations based on their geographic location. They need a way to meet compliance without interrupting operations or impacting day-to-day tasks.

Read More [fa icon="long-arrow-right"]

Implementing the NIST Cybersecurity Framework with PAM

[fa icon="calendar'] Feb 12, 2018 11:11:52 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

The National Institute of Standards and Technology (NIST) publishes the Framework for Improving Critical Infrastructure Cybersecurity.

Read More [fa icon="long-arrow-right"]

ISO 27001: Understanding the Importance of Privileged Access Management (PAM)

[fa icon="calendar'] Nov 15, 2017 4:53:28 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

We recently published a paper about the role of Privileged Access Management (PAM) in the ISO 27001 standard. ISO 27001 is the world’s most comprehensive and recognized Information Security Management System (ISMS) framework. 

Read More [fa icon="long-arrow-right"]

Health IT Security: Supervise Users with Privileged Access Management

[fa icon="calendar'] May 11, 2017 4:29:47 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 0 Comments

 Privileged access management helps your health IT security team manage and audit the activities of all privileged users. 

 

 

Read More [fa icon="long-arrow-right"]

SOX and Privileged Access Management

[fa icon="calendar'] Apr 19, 2017 12:21:08 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 1 Comment

Sarbanes Oxley… aka “SOX.” Wow, is that still a thing? Oh, yes, you can bet your 10K on it.  The law requires publicly traded corporations to document, implement, audit, and certify internal controls over financial reporting. This includes a great deal of attention to IT controls and policies.  Access controls are critical for SOX. As a result, SOX and Privileged Access Management (PAM) are closely linked, or should be.

Read More [fa icon="long-arrow-right"]