WALLIX is positioned in Gartner’s first Magic Quadrant for PAM

WALLIX is positioned in Gartner’s first Magic Quadrant for Privileged Access Management (PAM) WALLIX, leading European cybersecurity vendor, is proud to be included in the first ever Gartner Magic Quadrant for Privileged Access Management. We believe this recognition reflects the continued growth and strong results of our company, overperforming PAM market growth (x1.6) for 2017, and achieving a continuous 43%…

Utilizing Privileged Access Management (PAM) to Combat Multi-Tenant Environment Risks

Multi-tenancy, which involves the sharing of infrastructure, software, and network assets by more than one entity, is the predominant mode of computing in the cloud. There are good reasons for this. A multi-tenant environment is more efficient than alternative approaches like assigning each system its own individual machine. Cloud Service Providers (CSPs) host multiple companies' IT resources at once, providing each with…

PAM as a State of the Art Security Tool

Why PAM Is the State of the Art Security Tool The benefits of a well-implemented SIEM or IDS solution are clearly understood. The path to doing even better with them, however, depends on how efficiently the cybersecurity team can manage their output. SIEM and IDS tend to produce false positives or ambiguous findings that require follow up investigation. This is…

GDPR and Privileged Access Management (PAM): What International Businesses Need to Know

In fact, the GDPR applies to any business that deals with private EU resident data, regardless of whether they are based in the EU. For example, a US company with a subsidiary in the EU (or just doing business with EU citizens) would be bound by the rules. In other words, GDPR impacts virtually every company of any size everywhere…

PAM and Database Security

Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security. The users who represent the deepest threat to your database are also the people in whom you place the most trust: the…

IT Security Productivity

Few people want to talk about the nitty-gritty of IT Security productivity, but the reality is that companies are spending ever-increasing amounts on IT security so productivity is a topic that isn’t going away. Time is Money Like it or not, every task that requires an employee’s time comes at a price. If a person is paid $300 per day…

Using RSA Authentication Manager for PAM

The Need for Two-Factor Authentication Two-factor authentication requires the user to produce a second, variable proof of authenticity in order to access a resource like the network or an application. A bank ATM card is an example. Your account sign-on credentials are written onto the card’s magnetic stripe. However, you must enter your PIN to authenticate yourself before the bank…

Expert view: 3 steps to implement Privileged Access Management

In the world of cybersecurity, privileged access management (PAM) solutions are increasingly attractive for companies and organizations because they protect their most sensitive data and systems from cyber threats. How do you properly implement these solutions? Our expert replies in this exclusive interview. It is essential to properly implement a privileged access management solution to ensure data security. In this interview,…