Live Chat Software by Kayako |
Axidian Privilege 2.9: Enhancing Security Horizons with FreeIPA and RDP Innovations
Posted by Irina on 18 January 2024 04:24 PM |
|
Axidian introduces Axidian Privilege 2.9.
Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on Windows, but also on any Linux distribution with Docker support. Axidian introduced a new component RDP Proxy, which is based on freely distributed software. This component allows administrators to control connections to protected resources via the RDP protocol. User groups feature is upgraded. Earlier you Read Complete article | |
Axidian and vMind Hosted C-Level IT Security Summit in Turkey
Posted by tatyana on 05 October 2023 06:46 PM |
|
On the 26th of September, in partnership with vMind, we had the privilege of hosting the C-Level Security Summit in Turkey – an event dedicated to exploring the future of cybersecurity with a focus on the latest Identity and Access Management (IAM) and Privileged Access Management (PAM) trends. Read Complete article | |
Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM |
|
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8. Migration to .NET 6Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. User authentication support with RADIUSAxidian Privilege 2.8 supports user authentication with RADIUS. You can Read Complete article | |
PAM in Bahrain’s Financial Sector: Compliance and Cost-effectiveness Unite
Posted by anna.vlasenko on 14 June 2023 04:51 PM |
|
The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of Read Complete article | |
Interview: Volkan Duman, vMind General Manager, about IDC Summit 2022 and current IT security trends in Turkey
Posted by anna.vlasenko on 20 December 2022 04:49 PM |
|
Back in September Indeed Identity team participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. After that we met with Volkan Duman, vMind General Manager, to review the main topics that were discussed during the event and the state of the information security market in Turkey, the main trends of the outgoing year and the expected course of things in 2023. What is your overall impression of the IDC Summit this year? What do you think was the main focusRead Complete article | |
Indeed PAM 2.7: Empowering Enterprises with Advanced Privileged Access Protection
Posted by anna.vlasenko on 09 December 2022 01:58 PM |
|
Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness. Using Linux-based systems for Indeed PAM control serverVersion 2.7 enables you to install Read Complete article | |
5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM |
|
Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation. There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone Read Complete article | |
Indeed Identity hosted Business Breakfast together with CreaPlus and OSI.si
Posted by anna.vlasenko on 19 April 2022 03:21 PM |
|
On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and OSI.si. During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management. Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has Read Complete article | |
Webinar: Indeed PAM – your simplest way to control privileged access like a pro
Posted by anna.vlasenko on 22 April 2020 09:55 AM |
|
Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. Ask any IT manager and he/she will agree with it. So how come that privilege misuse is still one of the 3 top-patterns most often associated with breaches? If you also understand the big risks of unregulated privileged accounts and if you want to be 100% aware of all their Read Complete article | |
Password management for privileged users is the best practice
Posted by anna.vlasenko on 29 April 2019 03:36 PM |
|
Almost all of business critical data is stored in various information systems of a company. Business scaling leads to a need to delegate administrative responsibilities to subordinates completely or partially, or extend the privileges of top management employees. Therefore the heads of departments that use privileged accounts get access to additional confidential data. It is often the case that the access is granted without using a reliable system of controlling the Read Complete article | |