<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Eric Gaudin

Overseeing privileged access to your vital infrastructure, Product Marketing, WALLIX

Recent Posts

The Year of the RAT: Successful Cybersecurity By Knowing Your Threat

[fa icon="calendar'] Jan 24, 2020 5:33:58 PM / by Eric Gaudin posted in Improving Cybersecurity

[fa icon="comment"] 0 Comments

Chinese New Year 2020: The Year of the RAT

The year of the rat is going to be a strong, prosperous and lucky year, for those that carefully plan their objectives.

Read More [fa icon="long-arrow-right"]

Bastion Session Sharing: Empowering Secure Remote Collaboration

[fa icon="calendar'] Dec 12, 2019 4:27:00 PM / by Eric Gaudin

[fa icon="comment"] 0 Comments

Collaboration is essential in order to handle the diversity and complexity of the IT infrastructure required by today's digital transformation. This is particularly true when your workforce goes remote, and external contractors require access to critical infrastructure to provide maintenance to systems and equipment, and assist with critical systems setup.

Read More [fa icon="long-arrow-right"]

Cybersecurity Simplified: Security is Nothing Without Control

[fa icon="calendar'] Jul 10, 2018 11:52:26 AM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

When talking about Privileged Access Management, it’s important to focus on the real objective: to ensure that only the right person can access the right system at any given time. A password vault can easily handle that, but you really need more. It’s far more important to ensure that when someone accesses a target, this person does only what they are supposed to do, and nothing more.

Read More [fa icon="long-arrow-right"]

WALLIX Access Manager 2.0: Grant remote access without compromising security

[fa icon="calendar'] Jun 4, 2018 11:06:41 PM / by Eric Gaudin posted in WALLIX Products

[fa icon="comment"] 0 Comments

With a new Bastion comes a new Access Manager. After the release of the Bastion 6.0, the WALLIX team is very pleased to announce the new Access Manager 2.0.

Read More [fa icon="long-arrow-right"]

External Access: Connecting through a Bastion? Here's why PAM is your friend

[fa icon="calendar'] May 9, 2018 2:13:04 PM / by Eric Gaudin posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

Maintain a relationship of mutual confidence with your customers and colleagues

As an external provider of IT services or employee working remotely, whether you are ensuring the maintenance of critical equipment or managing a part, or the totality of, an IT infrastructure, transparency is crucial.

Not only should you provide best-in-class technical services in a timely manner, but you must also comply with security and regulations, control and defend your costs, and you must provide exceptional process and quality.

Because let’s face it, if a single thing goes wrong, each and every action you take will be under scrutiny.

Read More [fa icon="long-arrow-right"]

to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security