Compliance dictates we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?
[fa icon="calendar'] Apr 4, 2016 2:57:23 PM / by WALLIX posted in WALLIX Products, Reaching IT Compliance
Compliance dictates we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?
[fa icon="calendar'] Mar 31, 2016 5:31:18 PM / by WALLIX posted in Mitigating External Attacks, Reaching IT Compliance, Optimizing Cyber-Insurance
The scale, frequency and magnitude of cyber-crime is truly alarming and getting worse. Recent highly publicised attacks have served to push the issue much further up the management agenda to the extent that only the foolhardy would now argue that cyber-security is not a board level issue.
[fa icon="calendar'] Mar 29, 2016 3:38:58 PM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, WALLIX Products, Reaching IT Compliance
Privileged users can change system configurations, install software, create or modify other user accounts and access secure data.
[fa icon="calendar'] Mar 24, 2016 10:47:59 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access, Mitigating External Attacks, Reaching IT Compliance
The CeBIT 2016 rebranded itself as “innovation fair”, but it is no surprise that IT security and human behaviour in the digital world have been major concerns at the former computer trade show. IT security interests have escalated in the past few years and numerous astonishing security breach examples have surfaced.
[fa icon="calendar'] Mar 23, 2016 10:49:54 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access
Today, are there established ways to protect private and sensitive data information within operating systems or IT hosting services?
WALLIX is a software company offering privileged access management solutions to help enterprises, public organizations and cloud service providers protect their critical IT assets including data, servers, terminals and connected devices.
[fa icon="phone"] Get the right number
[fa icon="envelope"] sales@wallix.com
[fa icon="home"] Find the right location