Sarbanes Oxley… aka “SOX.” Wow, is that still a thing? Oh, yes, you can bet your 10K on it. The law requires publicly traded corporations to document, implement, audit, and certify internal controls over financial reporting. This includes a great deal of attention to IT controls and policies. Access controls are critical for SOX. As a result, SOX and Privileged Access Management (PAM) are closely linked, or should be.
WALLIX
Recent Posts
SOX and Privileged Access Management
[fa icon="calendar'] Apr 19, 2017 12:21:08 PM / by WALLIX posted in Reaching IT Compliance
Privileged Access Management and Vulnerability Systems: Qualys and WALLIX
[fa icon="calendar'] Apr 13, 2017 9:46:09 AM / by WALLIX posted in Mitigating External Attacks
Complexity is the enemy of cybersecurity. Yet, it can’t be avoided. Even a relatively small organization will have multiple people operating and administering multiple IT assets while fending off multiple threats. Any problem is basically a problem cubed. How do you keep things secure in that environment?
GDPR and Privileged Access Management (PAM): What International Businesses Need to Know
[fa icon="calendar'] Apr 7, 2017 11:30:32 AM / by WALLIX posted in Reaching IT Compliance
The European Union is on the verge of enacting its new privacy regulations, known as the General Data Protection Regulation (GDPR). Replacing the existing EU data privacy rules, GDPR is simply the latest in a long line of privacy regulations dating back to 1980. While GDPR clarifies and simplifies a number of data protection requirements, it adds new rules that will almost certainly present challenges to international businesses working in the EU.
PAM and Database Security
[fa icon="calendar'] Mar 31, 2017 6:25:51 PM / by WALLIX posted in Preventing Insider Threat
Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security.
Industrial Control Systems Security: An Interview with WALLIX
[fa icon="calendar'] Mar 23, 2017 2:54:14 PM / by WALLIX posted in Controlling Third Party Access, Mitigating External Attacks
Industrial Control Systems (ICS) are used to remotely control and monitor a variety of industrial enterprises like manufacturing, electricity, water, oil, and gas. The systems operate mostly on remote commands that are pushed to physical stations and devices. These systems are crucial in controlling and monitoring operations to ensure ongoing operations and safety for the surrounding community.