<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

23 NYCRR 500: Cybersecurity Requirements For Financial Services Companies

[fa icon="calendar'] Nov 15, 2016 2:00:00 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

23 NYCRR 500 is coming soon. As in, January 1, 2017. So, get ready.

 

Read More [fa icon="long-arrow-right"]

What is Privileged Account Management (PAM)?

[fa icon="calendar'] Nov 9, 2016 10:16:09 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 1 Comment

Privileged account management can be defined as managing and auditing account and data access by privileged users.

Read More [fa icon="long-arrow-right"]

3 Trends from Gartner’s Latest PAM Report

[fa icon="calendar'] Oct 26, 2016 5:02:00 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 1 Comment

Gartner, the famous information technology research and advisory company, recently published its 2016 Market Guide that delivers a neutral perspective of the Privileged Access Market. Like everyone, we always look forward to reading what the analysts have to say about the PAM market.

 

Read More [fa icon="long-arrow-right"]

Wallix AdminBastion Suite: a key element in Industrial Control Systems security

[fa icon="calendar'] Oct 11, 2016 7:19:12 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 3 Comments

For Industrial Control Systems, often described as Supervisory Control and Data Acquisition (SCADA), availability and safety are the two top priorities. However, security has now become a major issue and therefore must not be ignored.

 



Read More [fa icon="long-arrow-right"]

We Are PAM, We Are WALLIX

[fa icon="calendar'] Sep 30, 2016 2:46:29 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 0 Comments

Privileged Access Management (PAM) refers to a set of technologies designed to mitigate the inherent risks associated with the privileged user accounts of administrators and super-users. By providing full control and visibility of the sensitive, daily tasks of such personnel, an effective PAM solution can greatly reduce the risk of attack, while helping to ensure compliance with the relevant regulatory standards.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security