News

The International Organization for Standardization is an internationally known and respected agency that manages and structures standards for multiple areas, including cybersecurity. ISO 27001 is ‘a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.’ The standard does not advertise any specific products or tools, it offers some sort of comprehensive and


Read Complete article

We are happy to announce the new version of Indeed PAM, a software suite for managing privileged accounts. Version 2.1 introduces PostgreSQL storage support, import of resources from Active Directory and new functionality to manage permissions and user sessions. Please read on to learn more about these and other new features.

PostgreSQL support

In previous versions of Indeed PAM, only Microsoft SQL Server and its free version Microsoft SQL Express were used to manage


Read Complete article

Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. Ask any IT manager and he/she will agree with it. So how come that privilege misuse is still one of the 3 top-patterns most often associated with breaches?

If you also understand the big risks of unregulated privileged accounts and if you want to be 100% aware of all their


Read Complete article

Protect PHI and PII from employee misuse of privileged access
Posted by anna.vlasenko on 16 January 2020 11:32 AM

The modern healthcare system is rapidly changing with new and evolving technologies and equipment. 

These high-tech innovative technologies are replacing paper and it is clear that healthcare specialists should pay attention to, and focus on, organizational and technical issues, including the implementation of electronic medical records. It is also vitally important to maintain effective cost control of materials as well as optimizing costs whilst maintaining the quality of


Read Complete article

Indeed Privileged Access Manager (Indeed PAM) – version 2.0
Posted by anna.vlasenko on 04 December 2019 11:29 AM

We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The main additional features of Indeed Privileged Access Manager version 2.0 are dedicated SSH Proxy component, DBMS accounts management and command-line utility for managing solution settings. These and other specifications are below.

SSH PROXY 

The SSH Proxy has been developed for the Indeed PAM 2.0 software package to monitor SSH sessions without using


Read Complete article

Indeed Privileged Access Manager (Indeed PAM) – version 1.2
Posted by anna.vlasenko on 21 October 2019 11:55 AM

We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The new Indeed PAM 1.2 version has not only the revision of the existing functionality, but also new features, as well as tools to automate administration processes. They are designed to increase the flexibility and convenience for administrators and users. More about improvements permitting mechanism, added features and tools, see below.

СONTROL OF
Read Complete article

Indeed Privileged Access Manager (Indeed PAM) 1.1
Posted by anna.vlasenko on 10 June 2019 01:54 PM

Less than a year ago, we introduced a new software suite to manage access to privileged accounts – Indeed Privileged Access Manager (Indeed PAM).

The pilot implementations of Indeed PAM 1.0 were performed in enterprise informational systems in the first months after release. As a result, we received positive customer feedback on the product and suggestions for its development.

The Indeed PAM 1.1 features planned addons and functions implemented according to


Read Complete article

Password management for privileged users is the best practice
Posted by anna.vlasenko on 29 April 2019 03:36 PM

Almost all of business critical data is stored in various information systems of a company. Business scaling leads to a need to delegate administrative responsibilities to subordinates completely or partially, or extend the privileges of top management employees. 

Therefore the heads of departments that use privileged accounts get access to additional confidential data. It is often the case that the access is granted without using a reliable system of controlling the


Read Complete article

How to find out what privileged accounts are used for by employees?
Posted by anna.vlasenko on 26 April 2019 01:41 PM
Priveleged access manager

Management of risks – both reputation and financial – is one of the most important business tasks. Confidential information and internal regulations of any company is a higher priority target of business intelligence and competition. Protection of such data is a matter of confidence and high responsibility. Therefore, not all users of business information systems have privileged accounts. 

However, the presence of privileged users proper does not guarantee protection from data


Read Complete article

Make privileged access serve for your best not worst
Posted by Nadezhda Navadova on 21 August 2018 04:01 PM

Indeed Identity understands that the issue of controlling privileged access might be CISO’s headache. Lack of control over admin accounts, impossibility to investigate incidents connected with the misuse of privileged access,

potential comprometation risks are the weakness in the company’s cybersecurity that might lead to massive negative consequences. Let Indeed Identity sort the things out with the help of a new product – Privileged Access Manager.

Indeed Identity has been


Read Complete article


   Newer Posts