PAM and Database Security

Structured data is at the heart of virtually every company’s most valuable IT assets. Database security is therefore critical. In this article, we look at how a privileged access management (PAM) solution can improve your existing database security. The users who represent the deepest threat to your database are also the people in whom you place the most trust: the…

Wikileaks, Twitter hacks : 6 best practices to avoid data theft

Wikileaks revealing that the CIA turns our connected objects into spying tools, Twitter accounts getting hacked... Do you know how to protect your data ? The American intelligence agency would have elaborated several thousands malicious programs: virus, Trojan, malware… to take control and spy on us through our smartphones, connected televisions and even through our cars. We discover in those revelations that…

Denyall products refresh focuses on automation

DenyAll announces a refresh of its entire product line. New features address the needs of DevOps teams by simplifying and automating tasks associated with testing and protecting web applications, web services and APIs. Continuous integration and delivery is the name of the game for any business looking at digital transformation as a competitive differentiation opportunity and breaking organizational silos to…

IT Security Productivity

Few people want to talk about the nitty-gritty of IT Security productivity, but the reality is that companies are spending ever-increasing amounts on IT security so productivity is a topic that isn’t going away. Time is Money Like it or not, every task that requires an employee’s time comes at a price. If a person is paid $300 per day…

Using RSA Authentication Manager for PAM

The Need for Two-Factor Authentication Two-factor authentication requires the user to produce a second, variable proof of authenticity in order to access a resource like the network or an application. A bank ATM card is an example. Your account sign-on credentials are written onto the card’s magnetic stripe. However, you must enter your PIN to authenticate yourself before the bank…