Informatique/Électronique | 14 followers
Great read: how compliance helps you improve your business http://blog.wallix.com/compliance-a-route-to-better-your-business
Compliance - A route to better your business
Really, though... Today in business, digital storage, communication and transporting data across borders are the norm and we're seeing an increase in regulation and compliance in various forms. Some mandatory, some optional but all demanding that you comply to some extent with a set of standards tha…
Look at how Privileged Access Management Solutions can help IT Operations: http://blog.wallix.com/privileged-access-management-solutions-can-help-your-it-operations
SOX Compliance. It's Not Just Another US Thing http://blog.wallix.com/sox-compliance.-its-not-just-another-us-thing
SOX Compliance. It's Not Just Another US Thing
It feels like every week there are fresh headlines about hackers bringing organisations to their knees, and such stories always seem to be front-page news. In 2002, following a wave of high profile financial scandals driven by fraudulent accounting practices involving major US corporations including…
What is Privileged Access Management (PAM)? http://blog.wallix.com/what-is-privileged-access-management-pam
What is Privileged Access Management (PAM)?
The key is to get the importance of the word "Privileged." A privileged user is someone who has administrative access to critical systems. For instance, the individual who can set up and delete email accounts on Microsoft Exchange Server is a privileged user. The word is not accidental.
New article on the damages generated by cyber attacks http://blog.wallix.com/cyber-attacks-when-disaster-strikes
Cyber Attacks: When disaster strikes
you'll need to be prepared. And the alarming fact is that when it comes to cyber-attacks, most companies aren't. Technology is constantly evolving, and as former head of European Cybercrime Centre Troels Oerting says, "the computing domain is continually transforming or enhancing traditional crime."
Passwords & Insider Threats: The Threshold For Compromise is Shrinking http://blog.wallix.com/passwords-and-insider-threats-the-threshold-for-compromise-is-shrinking
Would You Want to Hold the Record for the Most Data Ever Leaked? http://blog.wallix.com/would-you-want-to-hold-the-record-for-the-most-data-ever-leaked
Is Security information and event management (SIEM) Enough? http://blog.wallix.com/is-security-information-and-event-management-siem-enough
Financial implications of PAM http://blog.wallix.com/financial-implications-privileged-access-management-pam-cost
It is difficult to estimate the content of laws and new rules. In December 2015 the General Data Protection Regulation (GDPR) has been decided by the EU-Commission and waits for final approval by the member states and the EU-parliament. Here is what you need to know http://blog.wallix.com/how-to-prepare-for-eu-standard-general-data-protection-regulation
Get all the latest updates from Wallix Group!