Compliance says that we need to log everything within scope, we must then review the reports of the logs. Can we really be trusted to look at all of these reports, and if so can we really get anything constructive out of them?
Are you really reading all those log reports?
[fa icon="calendar'] Sep 8, 2015 3:00:00 PM / by WALLIX posted in WALLIX Products, Reaching IT Compliance
VIDEO: Approval workflows for painless privileged user management
[fa icon="calendar'] Mar 19, 2015 1:03:05 PM / by WALLIX posted in WALLIX Products
How often do you need to allow one of your external service providers to access one of your critical resources or temporarily increase the privileges of someone in your IT team?
Digital Darwinism: Don’t let access management stop your business evolving
[fa icon="calendar'] Mar 3, 2015 4:58:54 PM / by WALLIX posted in Mitigating External Attacks, WALLIX Products
Recent times are littered with examples of businesses who failed to recognise the changing demands of their consumers and paid a heavy price.
It's elementary, my dear Network Admin!
[fa icon="calendar'] Nov 7, 2014 12:22:14 PM / by WALLIX posted in WALLIX Products
A friend of ours over at @experts_911 found this old post. It tells the story of how a couple of IT admins had to turn detective and figure out who had altered a Windows Group Policy which was denying access to the internet for everyone in their business.