<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Inside IT Security & Privileged Users Management

Privileged Session Management

[fa icon="calendar'] Nov 22, 2016 1:56:49 PM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 1 Comment

Privileged Session Management: What is it?

Privileged session management allows security administrators to monitor, control, and audit work sessions of privileged users. The session manager provides proxy-access to all critical resources and therefore prevents direct access to those resources. A session manager is central to privileged access management (PAM) and is generally integrated with an access manager and a password manager.

Read More [fa icon="long-arrow-right"]

What is Privileged Account Management (PAM)?

[fa icon="calendar'] Nov 9, 2016 10:16:09 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 1 Comment

Privileged account management can be defined as managing and auditing account and data access by privileged users.

Read More [fa icon="long-arrow-right"]

3 Trends from Gartner’s Latest PAM Report

[fa icon="calendar'] Oct 26, 2016 5:02:00 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 1 Comment

Gartner, the famous information technology research and advisory company, recently published its 2016 Market Guide that delivers a neutral perspective of the Privileged Access Market. Like everyone, we always look forward to reading what the analysts have to say about the PAM market.

 

Read More [fa icon="long-arrow-right"]

Wallix AdminBastion Suite: a key element in Industrial Control Systems security

[fa icon="calendar'] Oct 11, 2016 7:19:12 PM / by WALLIX posted in Preventing Insider Threat, Mitigating External Attacks

[fa icon="comment"] 3 Comments

For Industrial Control Systems, often described as Supervisory Control and Data Acquisition (SCADA), availability and safety are the two top priorities. However, security has now become a major issue and therefore must not be ignored.

 



Read More [fa icon="long-arrow-right"]

Identity Theft Resource Center reports 657 breaches

[fa icon="calendar'] Sep 19, 2016 11:16:31 AM / by WALLIX posted in Preventing Insider Threat

[fa icon="comment"] 0 Comments

 

The Identity Theft Resource Center (ITRC) Data Breach report has recently been published. The ITRC have been tracking security breaches in the United States since 2005, looking for patterns, new trends and any information that help the wider community to educate consumers and businesses on the need for understanding the value of protecting personal identifying information.


Read More [fa icon="long-arrow-right"]

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security