Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

How to manage privileged users in IT

This blog was written by an independent guest blogger. Privileged users are the key to the information system. The operation of information systems and the availability of enterprise resources depend on privileged users’ actions. If admins make a mistake or their credentials are leaked to attackers or competitors, it could put your business at serious risk.

How to Prepare for The Evolving Threat of Ransomware

Last week, when Russia advanced past Ukrainian borders we began to hear about the coordinated, hybrid attacks – spanning both cyber warfare and physical warfare – that lead up to the event. Phishing emails sent to the State Administration of Seaports of Ukraine sent earlier in February as a sort of advanced attack against Ukrainian ports. A new data wiper malware installed on hundreds of machines across Ukraine – reported within hours of Russia invading.

Things to Ask Your SSE Vendor: Episode 2: Does the ZTNA service offer DLP for private apps?

When it comes to private apps, data protection is critical. In this video see how SSE can be used to prevent employees and third-parties from downloading data, without the need for separate remote browser isolation technologies. Get ready to ask your vendor about their ability to protect private data from getting into the wrong hands.

Step into the new year with organized and secure IAM

According to Business Insider, 80% of people give up on their new year resolutions within the first 30 days. Don’t let your business and IT security goals fall into this trend, too! We’re now in February, but there’s still plenty of time to salvage your new-year goals, both your IT security and personal ones. The secret to falling into that successful 20% is to chart your resolution with clear plans on how to achieve it.

ManageEngine is recognized as a December 2021 Gartner Peer Insights Customers' Choice for Privileged Access Management

ManageEngine’s privileged access management (PAM) suite of products have helped over one million IT administrators and users around the globe efficiently manage their privileged credentials and access. On that note, we’re excited to announce that we’ve been recognized as a Gartner Peer Insights Customers’ Choice for Privileged Access Management!

Things to Ask Your SSE Vendor: Episode 2: Can You Securely Connect to AS400 via Agent and Agentless?

Not every application running in your environment will be a "modern" one. Many companies still use crown-jewel applications like AS400. The best SSE platforms can use zero trust network access (ZTNA) to securely access AS400 - not only when an agent is deployed on the device, but also through an agent-less RDP session as well. Can your SSE vendor do that?

Identity Access Management (IAM) Automation - Intro to Torq Webinar

Security teams are struggling to keep up with the increasing number of attack surfaces and the demands on remediating those attack surfaces in real-time. Security automation is the key to unlocking your security team’s productive potential, but traditional SOAR platforms (Security Orchestration, Automation, and Response) are complex and can take months of development to implement your first automation response sequence.

Things to Ask Your SSE Vendor: Episode 1: Does the User Experience Feel Consumer-Grade?

In this session the Axis team showcases what an SSE user experience should feel like. Whether turning an agent on, and off, and then being able to access a private resource in under two seconds. Or even the ability to go fully client-less, with no agent at all. Get ready to ask your SSE vendor about their end user experience.