<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

WALLIX


Recent Posts

Privileged Access Management Strategy | Devising an Effective PAM Strategy

[fa icon="calendar'] Jul 4, 2018 10:00:00 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

Security managers today understand they need to either implement or upgrade their Privileged Access Management (PAM) programs. The role of privileged account abuse in many recent, serious cyberattacks reveals just how important this aspect of security has become. Success, it turns out, involves more than just acquiring a PAM solution and installing it.

Read More [fa icon="long-arrow-right"]

Robust Privileged Identity Management Using Session Management

[fa icon="calendar'] Jun 12, 2018 10:51:41 AM / by WALLIX posted in Preventing Insider Threat, Controlling Third Party Access

[fa icon="comment"] 0 Comments

Ensuring security across organizations is complicated. Between securing the perimeter, enforcing password policies, and attempting to stop breaches before they occur, there is a lot that needs to be considered. Implementing robust privileged identity management through advanced session management tools is one of the key steps to improving organizational security.

Read More [fa icon="long-arrow-right"]

New Rules for Privileged Access Management (PAM)

[fa icon="calendar'] May 30, 2018 10:47:23 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

After a trying day at the Security Operations Center (SOC), a Privileged Access Management (PAM) super-admin just wants to have a nice cup of tea and a few minutes relaxing in front of the television before turning in for the night. But, as he dozes and slips into an InfoSec fever dream, he desperately seeks entertainment, flipping through the channels, returning again and again to the classic “New Rules” segment of “Real Time with Bill Maher.”

Read More [fa icon="long-arrow-right"]

IGA and PAM: How Identity Governance Administration Connects with Privileged Access Management

[fa icon="calendar'] May 15, 2018 9:05:00 AM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 2 Comments

Misappropriation of user identity is one of the root causes of many serious cybersecurity incidents. The threat can appear as a malicious actor impersonating an authorized system user, a hacker creating a fictitious user account, or a legitimate user taking improper actions. In each case, security managers may have trouble detecting the actions of an ill-intentioned user or they discover the problem after the fact.

Read More [fa icon="long-arrow-right"]

Privileged Access Management (PAM) for MSSPs Using AWS

[fa icon="calendar'] May 2, 2018 9:00:00 AM / by WALLIX posted in Mitigating External Attacks

[fa icon="comment"] 0 Comments

Amazon Web Services (AWS) present a good news story for service providers, but security challenges remain. AWS gives service providers a way to grow their businesses without having to deal with many of the hassles and costs of maintaining a cloud infrastructure. A Managed Security Services Provider (MSSP), for instance, can let AWS do the heavy lifting for them, supplying an essentially infinitely scalable infrastructure.

Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security