<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

The High Risk Access Management Solution to help IT Operations

[fa icon="calendar'] May 10, 2016 10:29:07 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, WALLIX Products

[fa icon="comment"] 1 Comment

Being head of IT Operations in a mid-sized or big enterprise is becoming a more and more demanding challenge

 

 

Read More [fa icon="long-arrow-right"]

Is Your Business Prepared For a Ransomware Stick-up?

[fa icon="calendar'] May 4, 2016 7:00:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments

Countless Victims

Ransom notes aren’t written with cut out newspaper letters anymore, but in computer code.

Read More [fa icon="long-arrow-right"]

General Data Protection Regulation: May Day, May Day

[fa icon="calendar'] May 3, 2016 9:23:48 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks, Reaching IT Compliance

[fa icon="comment"] 4 Comments

Well, the 5th to be precise, but here’s why you should be panicking…

 

Read More [fa icon="long-arrow-right"]

SOX Compliance. It’s Not Just Another US Thing

[fa icon="calendar'] Apr 28, 2016 7:00:00 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 1 Comment

 

It feels like every week there are fresh headlines about hackers bringing organisations to their knees, and such stories always seem to be front-page news. In 2002, following a wave of high profile financial scandals driven by fraudulent accounting practices involving major US corporations including Enron, the heat was such that the government introduced the Sarbanes Oxley Act, or the SOX Act, in an attempt to restore investor confidence. Cyber-attacks have forced us to change the way we do business, and organisations must now take greater responsibility for cyber security and report cyber breaches. This is both an important and positive step because it enables government agencies to strengthen security and allows individuals to mitigate harm, but it’s only a good thing for your business if you’re prepared…

 

Read More [fa icon="long-arrow-right"]

What is Privileged Access Management (PAM)?

[fa icon="calendar'] Apr 25, 2016 6:39:25 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks

[fa icon="comment"] 7 Comments

What is Privileged Access Management? 

The key is to understand the significance of the word “Privileged.”

A privileged user is someone who has administrative access to critical systems. For instance, the individual who can set up and delete email accounts on a Microsoft Exchange Server is a privileged user. The word is not accidental. Like any privilege, it should only be extended to trusted people. Only those seen as responsible can be trusted with “root” privileges like the ability to change system configurations, install software, change user accounts or access secure data. Of course, from a security perspective, it never makes sense to unconditionally trust anyone. That’s why even trusted access needs to be controlled and monitored. And, of course, privileges can be revoked at any time.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security