Call us  Discovering On-Premise & Cloud Identity and Access Management Solutions

Tag Archives: IAM PAM

When IGA Meets PAM: Extending Identity Governance to Highly Privileged Accounts

Post Image

When IGA Meets PAM: Extending Identity Governance to Highly Privileged Accounts Hackers, thieves and cyber attackers never sit idle. They constantly evolve their technology and approaches to breach security perimeters, gaining access to highly sensitive and lucrative information. Now more than ever, they are targeting users inside your organization using malware, social engineering and a […]

Post Tagged with , ,
Read More

CyberArk and ATOS launch PAM service

Post Image

CyberArk and ATOS launch PAM service CyberArk and ATOS have announced a joint offering around PAM (Privileged Access Management). ATOS is offering customers a PAM managed security services based on the CyberArk Privileged Account Security Solution. The goal is to stop attacks that target users who have high levels of privileges on the corporate network. […]

Post Tagged with , ,
Read More

Lieberman Software Integrates With Okta to Provide Secure Authentication for Privileged Access

Lieberman Software Integrates With Okta to Provide Secure Authentication for Privileged Access Lieberman Software Corporation today announced new capabilities that integrate the company’s Privileged Identity Management (PIM) platform, Enterprise Random Password Manager™ (ERPM), with Okta’s market leading authentication and security platform. The integration provides secure SSO that allows only authenticated users to access the powerful […]

Read More

Privileged accounts can be an open door to key assets

Post Image

Privileged accounts can be an open door to key assets Organizations accounts are accustomed to concentrating their identity and access management initiatives on granting, maintaining, controlling and governing end-user access to critical business resources. But, too often, they lose sight of applying that same level of due-diligence to privileged accounts — one of their most […]

Post Tagged with ,
Read More

What is Privileged Access Management (PAM)?

Post Image

What is Privileged Access Management (PAM)? A privileged user is someone who has administrative access to critical systems. For instance, the individual who can set up and delete email accounts on Microsoft Exchange Server is a privileged user. The word is not accidental. Like any privilege, it should only be extended to trusted people. Only […]

Post Tagged with ,
Read More

Webinar: Inside RadiantOne 7.2: New Advanced Security Features

Post Image

Inside RadiantOne 7.2: New Advanced Security Features RadiantOne 7.2, now enables you to encrypt data at rest, add multi-factor authentication, and protect key accounts with Privileged Identity/Access Management (PIM/PAM) software. You can learn all the details on Thursday April 28 by attending our webinar. Read more at – Inside RadiantOne 7.2: New Advanced Security Features

Read More

DBmaestro mitigates DevOps security risk with CyberArk

Post Image

DBmaestro mitigates DevOps security risk with CyberArk DBmaestro, the pioneer and leading provider of DevOps for database solutions, today announced a technology integration with the market leading CyberArk Privileged Account Security Solution. This integration helps improve security and compliance in DevOps environments by allowing DBmaestro to secure the powerful privileged access needed across the range […]

Read More

New Release Privilege Manager for Windows 3.2

Post Image

New Release Privilege Manager for Windows 3.2 Privilege Manager for Windows 3.2 is now ready for download. Look what’s new: • What’s new in Privilege Manager for Windows 3.2 • Added support for Windows 10 • Updated the data collection server installer to support targeting SQL Server 2014 or SQL Express 2014 • Updated the […]

Post Tagged with ,
Read More

A Missed Opportunity – Integrating Privileged Access Management with Identity Access Management

Post Image

A Missed Opportunity – Integrating Privileged Access Management with Identity Access Management Most organizations that implement Privileged Access Management (PAM) and Identity and Access Management (IAM) have done them independently but are missing some key values that could come from their integration. Getting control over user access, permissions and rights to address a security, compliance […]

Read More

Dell Security Launches Privileged Account Management Solution

Dell Security Launches Privileged Account Management Solution Dell Security is deepening its offerings in the identity and access management space, launching a new privileged account management solution that it says will be immediately available to channel partners. The solution, called Dell One Identity Safeguard for Privileged Passwords, adds additional controls and security around privileged accounts, […]

Read More