<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Cloud Password Management with PAM

[fa icon="calendar'] Apr 5, 2018 11:01:22 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Confidence in cloud security is growing. According to the Ponemon Institute’s 2018 Global Cloud Data Security Study, the percent of IT managers who feel that it is difficult to secure confidential or sensitive information in the cloud has fallen from 60% in 2016 to 49% today. That trend notwithstanding, many in the industry still feel cloud security is difficult to achieve. The same study reveals that 71% of IT managers believe is more difficult to apply conventional information security in the cloud computing environment, while 51% think it is more difficult to control or restrict end-user access.

Read More [fa icon="long-arrow-right"]

Will you survive your next security audit?

[fa icon="calendar'] Apr 3, 2018 2:04:03 PM / by WALLIX posted in Preventing Insider Threat, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

A security audit is something that every single company with an internet connection, and that handles customer/individual data should be concerned with. Without elaborating more than necessary, recent regulations makes it, if not mandatory, at least strongly recommended to audit your IT security to ensure compliance.

Read More [fa icon="long-arrow-right"]

Picking a PAM Solution

[fa icon="calendar'] Mar 28, 2018 9:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Imagine a hacker is lurking inside your network. Indeed, it’s likely a few malicious actors are already inside your domain despite your best efforts to keep them away. Now, imagine the hacker stealing the credentials of a trusted system administrator. With the back-end access permitted to this privileged user, imagine the kind of damage the hacker can do.

Read More [fa icon="long-arrow-right"]

WALLIX at RSA Conference 2018

[fa icon="calendar'] Mar 22, 2018 10:06:59 AM / by WALLIX posted in Events

[fa icon="comment"] 0 Comments

You’ve seen us in Belgium… you’ve seen us in Abu Dhabi… Now find us in San Francisco at RSA Conference 2018!

Read More [fa icon="long-arrow-right"]

Addressing MSSP Cybersecurity Challenges with Privileged Access Management

[fa icon="calendar'] Mar 20, 2018 11:58:25 AM / by WALLIX posted in Controlling Third Party Access, Optimizing Cyber-Insurance

[fa icon="comment"] 0 Comments

Outsourcing of security is on the rise. The MSSP business grew into a $9 billion category in 2017, and Gartner reports that over 50% of organizations will be outsourcing some or all of their security work to Managed Security Service Providers (MSSPs) by next year. 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security