Would you really wear sockets with flip flops to walk on a nice sandy beach? The same thing goes with SSH agent-forwarding: using a socket can sometimes be inappropriate.
WALLIX
Recent Posts
SSH agent-forwarding: going barefoot (socket-less)
[fa icon="calendar'] Nov 24, 2017 11:28:50 AM / by WALLIX posted in Optimizing Cyber-Insurance
PAM for Financial Services: Preventing Cyber-Attacks in Finance
[fa icon="calendar'] Nov 20, 2017 2:42:53 PM / by WALLIX posted in Mitigating External Attacks
All organizations understand the need to have strong cybersecurity measures in place to protect personal and corporate data. Financial services, in particular, have an increased need for advanced security with both money and personal data at risk.
ISO 27001: Understanding the Importance of Privileged Access Management (PAM)
[fa icon="calendar'] Nov 15, 2017 4:53:28 PM / by WALLIX posted in Reaching IT Compliance
We recently published a paper about the role of Privileged Access Management (PAM) in the ISO 27001 standard. ISO 27001 is the world’s most comprehensive and recognized Information Security Management System (ISMS) framework.
Gartner Market Guide for Privileged Access Management Report: WALLIX Recognized as a Representative Vendor
[fa icon="calendar'] Nov 3, 2017 10:32:07 AM / by WALLIX posted in Preventing Insider Threat
Privileged access management (PAM) is becoming an increasingly important aspect of security infrastructure for organizations of all sizes. Many recent breaches including the Equifax breach and Deloitte breach could have both been prevented if these organizations had a PAM solution in place.
PAM, SIEM, and SAO: Leveraging Cybersecurity Tools to Move the Needle on Alert Management
[fa icon="calendar'] Nov 2, 2017 3:41:50 PM / by WALLIX posted in Mitigating External Attacks
Every cybersecurity operation is like NORAD, the command post where the US Air Force “opens up one eager eye, focusing it on the sky…” as the German singer Nena put it in her 1980s classic “99 Red Balloons.” Instead of watching for 99 red balloons, we’re looking at alerts, an endless, massive flood of security alerts—more than 10,000 per day for most organizations.