Live Chat Software by Kayako |
Video: Why is PAM a must-have for Singaporean financial sector?
Posted by maya.ivanova on 21 June 2021 01:30 PM |
|
The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the value of well-thought cybersecurity and call for urgent actions to enhance the IT security status in the country. The Monetary Authority of Singapore (MAS) has already introduced a set of regulations in terms of privileged account management for financial institutions. One of the MAS statements is «Users Read Complete article | |
Indeed PAM 2.4: your fastest way to the future of cybersecurity
Posted by maya.ivanova on 24 May 2021 03:53 PM |
|
Indeed Privileged Access Manager keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access management. Meet the latest release of Indeed PAM 2.4: Use concurrent session licensingThe newly added Indeed PAM licensing scheme is based on the number of sessions. This type of license limits the number of concurrent active sessions in Indeed PAM without restricting the number Read Complete article | |
Roundtable: Best PAM approach – what requires your full attention
Posted by maya.ivanova on 16 April 2021 07:40 AM |
|
Privileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the upcoming years, PAM implementation the #1 priority for many companies in Turkey. The selection of PAM is a complex process that can be confusing if you do not know where to start. Day by day security officers looking for the best fit solution face the same questions. During our PAM roundtable, three cybersecurity experts discussed the Read Complete article | |
Secure authentication in your pocket – meet newest release of Indeed Key 2.1
Posted by anna.vlasenko on 14 April 2021 10:56 AM |
|
When it comes to multi-factor authentication, any cybersecurity officer knows – usability is a must step toward users’ acceptance of the technology. The product will be ignored if it is not user-friendly. Here is where Indeed Key comes to the rescue. It is a mobile application that transforms a smartphone into an easy-to-use security tool for authentication. It can be used for access to all enterprise resources: email, VPN, web-applications, PC, etc. In our releases, we always Read Complete article | |
5 global PKI trends that affect any enterprise
Posted by anna.vlasenko on 26 March 2021 10:59 AM |
|
Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and adapts to the rapidly changing digitalization. We’ve collected the most important PKI trends that you cannot miss. Let’s get started. Trend 1. There is a global tendency to actively replace obsolete or end-of-life PKI products. There is a notable gap between the customers’ Read Complete article | |
Smart cards for smarter future – Interview with Feitian Technologies, leading global provider of smart cards
Posted by anna.vlasenko on 18 March 2021 10:39 AM |
|
Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of smart cards has led to the emergence of virtual, mobile ones, which are getting more popular in Europe. Can these cards replace traditional physical ones? What do customers choose and what functionalities are important to them? In this interview, Julien Larsonneur , Senior Sales Manager of Feitian Technologies in Read Complete article | |
Where does PKI evolution go? – Interview with Nevenko Bartolinčić
Posted by anna.vlasenko on 03 March 2021 11:44 AM |
|
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When does the new era of cryptography start? We have collected these and other exciting and hot-topic questions about PKI now and future and addressed them to Nevenko Bartolinčić, Senior Security Architect of Span and PKI expert at the roundtable «Evolution of Trust: Get ready for PKI 2.0» What do you think is Read Complete article | |
The New Normal of European PKI – An Interview With CA Expert Adam Ross
Posted by maya.ivanova on 17 February 2021 10:48 AM |
|
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected the PKI landscape? eIDAS and PKI: how do they correlate? What will bring the growing importance of public CAs? We interviewed Adam Ross, product and sales manager of cryptovision, and asked him the most tricky questions related to the new normal of the European PKI. Adam, would it be accurate to say that Read Complete article | |
Interview: CMS Expert Answers the Most Tricky PKI Questions
Posted by maya.ivanova on 11 February 2021 09:51 AM |
|
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go in line with the growing needs of users. Legacy systems are not able to meet modern customer requirements, giving rise to a number of concerns. We invited Nikolay Lazitskiy, one of the PKI experts, to provide answers to the most painful and tricky questions of customers worldwide. One of the most popular Read Complete article | |
Roundtable: Evolution of Trust. Get ready for PKI 2.0
Posted by anna.vlasenko on 28 December 2020 02:03 PM |
|
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, the PKI evolution does not keep pace with the growing needs of customers’ since legacy software and hardware are unable to address the newest challenges. And here the questions arise: what does the PKI future look like and what are the existing PKI trends? To find answers to these questions, we invite you to Read Complete article | |