Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

The Security Service Edge: EXPLAINED

Security service edge (SSE) will be one of the most talked about subjects in 2022, and beyond. The problem is not many IT leaders understand what SSE is, how it differs from SASE, what to look for when selecting one, or the value they provide for the business. In the video below I demystify SSE. Enjoy. If you are interested in learning more about SSE feel free to speak with our team here at Axis! We’d be happy to provide a quick demo of our SSE platform

3 Tips to Avoid Roadblocks on Your Journey to Securing the Modern Workplace

I was on the call with a potential customer and heard the following, “Our last try at implementing Zero Trust Networking (ZTNA) utterly failed. We purchased the solution from vendor X, deployed it but didn’t account for the network team. Since the solution did not account for their network diagnostic tools (ping and traceroute), they are refusing to support us.

6 Network Authentication Methods to Prevent a Data Breach

Cybercriminals are continuously finding new ways to steal sensitive information. Having robust network security measures in place is now more important than ever — and network authentication is part of the solution. There are various authentication technologies available that can add an extra layer of protection to prevent security lapses, and each one offers a unique solution. This post will highlight the most common methods for network authentication and answer the following questions.

The Role of Zero Trust in Enabling Hybrid Work

Zero Trust…it’s probably one of the biggest IT buzzwords in the last decade. While it seems that every vendor claims to be an enforcer of zero trust, there is value behind the concept if you can cut through the marketing haze. One of the greatest areas of value is around enabling hybrid work for employees. Remote work and hybrid work have extended the corporate world to every home, and user device. The workforce must access wherever they are, from whatever device is in front of them.

Key trends from 2021 that redefined IAM

With 2022 around the corner, many want to hit the ground running and make the new year different from the last. If you’ve also been preparing for a productive year and scaling your organization up, this blog will bring you up to speed on the major security trends of 2021 you should know about. With ADManager Plus, you can easily adapt to these new trends and be ready to take on any IAM challenge in 2022. For now, here are the major IAM trends of 2021.

Over-Privileged Service Accounts Create Escalation of Privileges and Lateral Movement in Google Cloud

In this blog, we’ve analyzed data from Netskope customers that include security settings of over 1 million entities in 156,737 Google Cloud (GCP) projects across hundreds of organizations (see Dataset and Methodology for more details on the dataset). We will specifically look at the configuration of service accounts, see what’s commonly occurring in the real world, and analyze how multiple security misconfigurations can lead to escalation of privileges and lateral movement.

Privileged account management challenges: comparing PIM, PUM and PAM

Most cyberattacks originate outside the organization. Numerous articles, vulnerability reports, and analytical materials prove this fact. External attacks are usually carried out based on the following scenario: Obviously, it is impossible to provide protection at all stages of an attack using only one type of protection. It is tough to do without a dedicated team and security solutions like firewalls, intrusion detection, antiviruses and more.

Managing personal passwords | ManageEngine PAM360

ManageEngine PAM360 is an enterprise-grade unified privileged access management solution that offers strict governance of privileged accounts, credentials, digital entities, and other shared sensitive information. Watch this tutorial on how to securely store, track and manage personal passwords in PAM360.

Zero doubt about the direction of zero trust security

The adoption of zero trust is about to change dramatically. In May, the Biden administration announced its cybersecurity Executive Order (EO), stressing the urgency of modernized access and cybersecurity defenses. Consequently, many enterprises can no longer ignore the necessity of investing in zero trust architectures.