<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

SOX and Privileged Access Management

[fa icon="calendar'] Apr 19, 2017 12:21:08 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 2 Comments

Sarbanes Oxley… aka “SOX.” Wow, is that still a thing? Oh, yes, you can bet your 10K on it.  The law requires publicly traded corporations to document, implement, audit, and certify internal controls over financial reporting. This includes a great deal of attention to IT controls and policies.  Access controls are critical for SOX. As a result, SOX and Privileged Access Management (PAM) are closely linked, or should be.

Read More [fa icon="long-arrow-right"]

Privileged Access Management and Vulnerability Systems: Qualys and WALLIX

[fa icon="calendar'] Apr 13, 2017 9:46:09 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Complexity is the enemy of cybersecurity. Yet, it can’t be avoided. Even a relatively small organization will have multiple people operating and administering multiple IT assets while fending off multiple threats. Any problem is basically a problem cubed. How do you keep things secure in that environment?

 

Read More [fa icon="long-arrow-right"]

GDPR and Privileged Access Management (PAM): What International Businesses Need to Know

[fa icon="calendar'] Apr 7, 2017 11:30:32 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 1 Comment

The European Union is on the verge of enacting its new privacy regulations, known as the General Data Protection Regulation (GDPR). Replacing the existing EU data privacy rules, GDPR is simply the latest in a long line of privacy regulations dating back to 1980. While GDPR clarifies and simplifies a number of data protection requirements, it adds new rules that will almost certainly present challenges to international businesses working in the EU.

Read More [fa icon="long-arrow-right"]

PAM and Database Security

[fa icon="calendar'] Mar 31, 2017 6:25:51 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security.

Read More [fa icon="long-arrow-right"]

Industrial Control Systems Security: An Interview with WALLIX

[fa icon="calendar'] Mar 23, 2017 2:54:14 PM / by WALLIX posted in Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 1 Comment

Industrial Control Systems (ICS) are used to remotely control and monitor a variety of industrial enterprises like manufacturing, electricity, water, oil, and gas. The systems operate mostly on remote commands that are pushed to physical stations and devices. These systems are crucial in controlling and monitoring operations to ensure ongoing operations and safety for the surrounding community.

 

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security