<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Uniting Identity Access Management (IAM) and PAM for Cohesive Identity Governance

[fa icon="calendar'] Sep 5, 2018 11:22:37 AM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity

[fa icon="comment"] 1 Comment

This month marks the 25th anniversary of the famous “On the Internet, no one knows you’re a dog” cartoon appearing in The New Yorker. Oh, how true that was, and still is, a quarter century later. Chances are, artist Peter Steiner had no idea how prescient his drawing was. We are indeed in the Internet dog days, of identity access management (IAM) and PAM at least.

Read More [fa icon="long-arrow-right"]

The Critical Elements of a Scalable PAM Solution

[fa icon="calendar'] Aug 28, 2018 9:00:00 AM / by WALLIX posted in Controlling Third Party Access, Improving Cybersecurity

[fa icon="comment"] 0 Comments

An organization’s security posture benefits from the ability to manage and track access to privileged accounts. Privileged users—as well as those impersonating them—can present major security threats. A Privileged Access Management (PAM) solution offers an answer. It enables security teams to stay on top of privileged account access. To work, however, it must be a scalable PAM solution. The PAM solution must scale flexibly in a growing organization or suffer being disused, to the detriment of security overall. What does it take to build a scalable PAM solution? This article explores the answer to that question.

Read More [fa icon="long-arrow-right"]

Supply Chain Management and Supply Chain Security: Addressing Vulnerabilities with PAM

[fa icon="calendar'] Aug 14, 2018 9:02:00 AM / by WALLIX posted in Improving Cybersecurity

[fa icon="comment"] 4 Comments

Supply chains are essential for the proper functioning of industrial systems and critical infrastructure. However, they’re also quite messy, in terms of security. Supply chains invariably connect users and systems from multiple entities, often in different countries. This setup exposes every company in the supply chain to cyber risk. Among countermeasures, Privileged Access Management (PAM) offers one of the best ways of minimizing supply chain vulnerabilities.

Read More [fa icon="long-arrow-right"]

Privileged Account Security Solution | Understanding Privileged Account Security

[fa icon="calendar'] Jul 31, 2018 9:03:00 AM / by WALLIX posted in Preventing Insider Threat, Improving Cybersecurity

[fa icon="comment"] 0 Comments

Previously, we have focused on the security issues raised by privileged users . As the people who can access the administrative back ends of critical systems, privileged users represent a potential threat vector. After all, they can get into confidential data, account settings, and system configurations. Equally or even more important to security than privileged users, however, is the concept of the privileged account. A privileged account is the actual mechanism by which a privileged user gains access to administrative controls. Having a privileged account security solution in place is thus an essential practice for the maintenance of a robust security posture.
Read More [fa icon="long-arrow-right"]

SCADA Security and Privileged Access Management (PAM)

[fa icon="calendar'] Jul 17, 2018 9:00:00 AM / by WALLIX

[fa icon="comment"] 3 Comments

Industrial plants and power utilities commonly employ the well-established Supervisory Control and Data Acquisition (SCADA) framework to manage their Operational Technology (OT) systems. In recent years, SCADA’s cyber risk exposure has increased with the advent of the Internet and the IP-enabling of traditionally isolated SCADA system elements.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security