Privileged Access Management / PAM stories
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
One Identity extends identity security platform with OneLogin acquisition
“By adding OneLogin to our portfolio, and incorporating it into our cloud-first Unified Identity Security Platform, we can help customers holistically correlate all identities."
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
One Identity hits new milestone with latest PAM solution certification
One Identity has achieved Common Criteria certification by the National Information Association Partnership (NIAP) for its Safeguard for Privileged Passwords 6.7 privileged access management (PAM) solution.
OneLogin solution to enable organisations to adopt Zero Trust principle of least privilege access
“For organisations to adopt a Zero Trust framework, they must embrace the concept of least privilege access."
Thycotic and Centrify named as Leaders in Gartner MQ for Privileged Access Management
According to ThycoticCentrify CEO Art Gilliland, each company’s strengths noted in the report supports the position that the two companies work better together as one.
Video: 10 Minute IT Jams - BeyondTrust on securing critical infrastructure
In Techday's second IT Jam with BeyondTrust, we speak to the company's sales engineer Scott Hesford about critical infrastructure and how best to secure it.
Microsoft partners with Vectra AI on Zero Trust security framework
Vectra AI has announced the Vectra Cognito platform will deliver key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers.
Internet of Things in desperate need of more robust identity and access management
"IAM is yet another identity and security framework that poses significant challenges when crossing from the IT realm onto the IoT."
Privileged access management vital as ransomware risks escalate
"PAM has become a key battleground in cyber security and the combined ThycoticCentrify is perfectly positioned to support our distribution channel partners and their customers."
Misconfigured cloud services in SEA at risk of exploitation by threat actors
The most common misconfiguration included unrestricted outbound access to network ports that could be used to gain unauthorised entry into an organisation’s network.
Imprivata extends PAM capabilities with Xton acquisition
"Through this acquisition, Imprivata will enable richer authentication and access management, a key pillar in the Imprivata digital identity framework, and broaden our mutual reach to new and current customers."
ThycoticCentrify adds just-in-time workflows to Server Suite
The latest version of ThycoticCentrify's flagship PEDM solution now includes session audit data masking capabilities for UNIX, to reduce the risk of exposing potentially sensitive or highly restricted data.
Attivo Networks launches CIEM solution to bolster identity management offerings
The solution is esigned to reduce the attack surface for entitlements and identities within the cloud.
Solving the problem of privilege with zero trust security
BeyondTrust’s Universal Privilege Management model recognises that securing passwords is not enough — privileges must be secured across environments.
How PAM can help to prevent major security disasters like Colonial Pipeline
When a cyber attack on the United States Colonial Pipeline erupted in May this year, the fallout was almost unthinkable.
Why BeyondTrust privileged access management matters on AWS
A move to the cloud is a no-brainer for organisations that need flexibility and scalability in their IT systems - here's how to do privileged access management (PAM) right the first time.
Video: 10 Minute IT Jams - Who is BeyondTrust?
In this IT Jam, Techday speaks to BeyondTrust director of solutions engineering Ajay Kumar, who discusses cybersecurity in 2021 and the role of PAM.
ThycoticCentrify rolls out privileged management security features
ThycoticCentrify has added new privilege management security capabilities to Thycotic Privilege Manager and made additions to Thycotic Account Lifecycle Manager, its solution for service account governance.
Transcription technology can be a serious ally in the struggle for compliance
Spoken words form a huge part of the intelligence and evidence captured by an insurer, yet data suggests that globally, as little as 15% of transcripts are digitised.
ThycoticCentrify updates PAM capabilities across Secret Server & DevOps Secrets Vault
"To stay ahead of the threat curve, security and ITops teams are looking for ways to adopt and update security best practices, like PAM, in the most convenient way.”
Universities turn to privileged access management as they adopt Essential Eight cybersecurity strategies
The education sector continues to be a key target for a cyber attack.
ThycoticCentrify launches additions to DevOps Secrets Vault
"With the need for cloud security skyrocketing, enterprises can now address these new use cases more efficiently with an integrated solution.”
Thycotic and Centrify complete merger, target PAM market
The combined company has now begun integrations and will operate under the temporary name ThycoticCentrify.