Live Chat Software by Kayako |
Safeguarding Supply Chains: The Role of Privileged Access Management in Preventing Attacks
Posted by tatyana on 05 August 2024 06:31 PM |
|
The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our cars. A single compromised software can trouble your entire organization by interrupting operations and exposing sensitive data. These disruptions not only cause financial losses but also erode customer trust. This is the chilling reality of supply chain attacks. However, implementation of PAM can help organizations to safeguard critical systems Read Complete article | |
Axidian Privilege 2.9: Enhancing Security Horizons with FreeIPA and RDP Innovations
Posted by Irina on 18 January 2024 04:24 PM |
|
Axidian introduces Axidian Privilege 2.9.
Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on Windows, but also on any Linux distribution with Docker support. Axidian introduced a new component RDP Proxy, which is based on freely distributed software. This component allows administrators to control connections to protected resources via the RDP protocol. User groups feature is upgraded. Earlier you Read Complete article | |
Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM |
|
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8. Migration to .NET 6Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. User authentication support with RADIUSAxidian Privilege 2.8 supports user authentication with RADIUS. You can Read Complete article | |
PAM in Bahrain’s Financial Sector: Compliance and Cost-effectiveness Unite
Posted by anna.vlasenko on 14 June 2023 04:51 PM |
|
The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of Read Complete article | |
Interview: Volkan Duman, vMind General Manager, about IDC Summit 2022 and current IT security trends in Turkey
Posted by anna.vlasenko on 20 December 2022 04:49 PM |
|
Back in September Indeed Identity team participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. After that we met with Volkan Duman, vMind General Manager, to review the main topics that were discussed during the event and the state of the information security market in Turkey, the main trends of the outgoing year and the expected course of things in 2023. What is your overall impression of the IDC Summit this year? What do you think was the main focusRead Complete article | |
CxO Round Table in Turkey by vMind and Indeed Identity
Posted by anna.vlasenko on 15 December 2022 04:57 PM |
|
Indeed Identity joined CxO Round Table in Turkey organized together with our partners vMind under the moderation of BThaber. As one of the event sponsors, Indeed Identity was present at the roundtable discussion and represented by Konstantin Krasovskij, EMEA Director, Pavel Konyukhov, CTO and Anna Surovova, Head of global sales and partnerships. Together with vMind, we have been delivering authentication and comprehensive access control, privileged access management (PAM) and PKI management Read Complete article | |
Indeed PAM 2.7: Empowering Enterprises with Advanced Privileged Access Protection
Posted by anna.vlasenko on 09 December 2022 01:58 PM |
|
Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness. Using Linux-based systems for Indeed PAM control serverVersion 2.7 enables you to install Read Complete article | |
Indeed Identity, SPG and Sophos joined forces to host SPG Business Security Days in Tunisia
Posted by anna.vlasenko on 06 October 2022 02:56 PM |
|
On 29th of September Indeed Identity joined SPG Software Productivity Group and Sophos in Tunisia to host SPG Business Security Days at the Novotel Lac Tunis hotel. Our director Konstantin Krasovskij talked about the importance of privileged access management and how companies can implement it with minimum effort and maximum benefits. The main focus of the presentation was on the most interesting user scenarios connected with access management and authentication of different categories Read Complete article | |
5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM |
|
Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation. There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone Read Complete article | |
Indeed Identity hosted Business Breakfast together with CreaPlus and OSI.si
Posted by anna.vlasenko on 19 April 2022 03:21 PM |
|
On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and OSI.si. During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management. Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has Read Complete article | |