<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Do we worry about hackers and forget about IT hygiene?

[fa icon="calendar'] Oct 22, 2014 1:22:17 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

Am I the only person who thinks the coolest part of most action films is when the guy with just a laptop plants a virus in the most secure network in the history of networks bringing the western world to its knees?!

Read More [fa icon="long-arrow-right"]

IT Budgets stay healthy. But innovation isn't a priority

[fa icon="calendar'] Oct 22, 2014 1:19:01 PM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments


Businesses recognise that investment in IT infrastructure is vital, but aren't prepared to put money towards innovation. Research firm Deloitte are reporting that almost half of the CIOs they surveyed for a recent report are spending only around 10% of budgets on new technologies.

Read More [fa icon="long-arrow-right"]

The Data Breach Guide: How to turn into a hero

[fa icon="calendar'] Oct 22, 2014 1:11:00 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 0 Comments


In the immortal words of Jack Bauer, "events occur in real time". If the longest day of your life is the one immediately following a data breach in your organisation it’s unlikely that Jack will turn up to be the hero.

Read More [fa icon="long-arrow-right"]

Another win for Wallix at the Computing Security Awards

[fa icon="calendar'] Oct 14, 2014 11:44:22 AM / by WALLIX posted in Reaching IT Compliance

[fa icon="comment"] 0 Comments

The Computing Security Awards were held in London on 9th October 2014, Wallix was delighted to win New Product of the Year for WAB On Demand.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security