<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

WALLIX is positioned in Gartner’s first Magic Quadrant for PAM

[fa icon="calendar'] Dec 18, 2018 6:29:36 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 3 Comments

WALLIX is positioned in Gartner’s first Magic Quadrant for Privileged Access Management (PAM)

Read More [fa icon="long-arrow-right"]

Securing DevOps in the Cloud with Privileged Access Management (PAM)

[fa icon="calendar'] Dec 7, 2018 6:18:07 PM / by WALLIX posted in Cloud Security

[fa icon="comment"] 0 Comments

A recent cybersecurity news item should trigger concern for anyone involved in cloud-based software development. As reported in CSO, an attacker breached a popular Node.js module. After building trust and gaining owner-level access, he or she was able to push a compromised version that hid Bitcoin and Ethereum hot wallet credentials for malicious purposes in the code.

Read More [fa icon="long-arrow-right"]

Utilizing Privileged Access Management (PAM) to Combat Multi-Tenant Environment Risks

[fa icon="calendar'] Nov 28, 2018 11:01:37 AM / by WALLIX

[fa icon="comment"] 1 Comment

Multi-tenancy, which involves the sharing of infrastructure, software, and network assets by more than one entity, is the predominant mode of computing in the cloud. There are good reasons for this. A multi-tenant environment is more efficient than alternative approaches like assigning each system its own individual machine. Cloud Service Providers (CSPs) host multiple companies' IT resources at once, providing each with cost savings compared to self-hosting all resources on-premise.

Read More [fa icon="long-arrow-right"]

The Forrester Wave™ | WALLIX Recognized Among Top PIM Vendors

[fa icon="calendar'] Nov 14, 2018 4:58:30 PM / by WALLIX posted in WALLIX Products

[fa icon="comment"] 2 Comments

WALLIX makes its debut in The Forrester Wave™: Privileged Identity Management, Q4 2018, which evaluated the “11 providers that matter most.”

Read More [fa icon="long-arrow-right"]

Utilizing Session Management for Privileged Account Monitoring

[fa icon="calendar'] Oct 31, 2018 10:34:51 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 2 Comments

Maintaining visibility and protecting an organization’s most critical data and systems are central components of robust security operations. Privileged users present a unique risk to companies, whose credentials may get into the wrong hands, resulting in devastating consequences. To maintain the level of visibility and control required for numerous compliance regulations, many organizations look toward session management solutions to provide them with the tools they need to ensure proper security 24/7.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security