Live Chat Software by Kayako |
Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM |
|
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8. Migration to .NET 6Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. User authentication support with RADIUSAxidian Privilege 2.8 supports user authentication with RADIUS. You can Read Complete article | |
PAM in Bahrain’s Financial Sector: Compliance and Cost-effectiveness Unite
Posted by anna.vlasenko on 14 June 2023 04:51 PM |
|
The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of Read Complete article | |
CxO Round Table in Turkey by vMind and Indeed Identity
Posted by anna.vlasenko on 15 December 2022 04:57 PM |
|
Indeed Identity joined CxO Round Table in Turkey organized together with our partners vMind under the moderation of BThaber. As one of the event sponsors, Indeed Identity was present at the roundtable discussion and represented by Konstantin Krasovskij, EMEA Director, Pavel Konyukhov, CTO and Anna Surovova, Head of global sales and partnerships. Together with vMind, we have been delivering authentication and comprehensive access control, privileged access management (PAM) and PKI management Read Complete article | |
Indeed PAM 2.7: Empowering Enterprises with Advanced Privileged Access Protection
Posted by anna.vlasenko on 09 December 2022 01:58 PM |
|
Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness. Using Linux-based systems for Indeed PAM control serverVersion 2.7 enables you to install Read Complete article | |
Indeed Identity, SPG and Sophos joined forces to host SPG Business Security Days in Tunisia
Posted by anna.vlasenko on 06 October 2022 02:56 PM |
|
On 29th of September Indeed Identity joined SPG Software Productivity Group and Sophos in Tunisia to host SPG Business Security Days at the Novotel Lac Tunis hotel. Our director Konstantin Krasovskij talked about the importance of privileged access management and how companies can implement it with minimum effort and maximum benefits. The main focus of the presentation was on the most interesting user scenarios connected with access management and authentication of different categories Read Complete article | |
Indeed Identity joined IDC Summit in Turkey as a silver sponsor
Posted by anna.vlasenko on 28 September 2022 11:52 AM |
|
Indeed Identity participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. The event took place on 22nd of September aiming to tackle the cybersecurity strategies that are being implemented in the MEA region and gathered many IT security professionals. Industry experts joined this event to exhibit modern approaches and technologies that can help companies to empower their IT infrastructure. Many great ideas were voiced and, as one of the speakers, Burak Ozan Read Complete article | |
Konstantin Krasovskij, Indeed Identity: PAM should be accessible for companies of any size
Posted by anna.vlasenko on 14 February 2022 04:16 PM |
|
Hackers have always had itchy fingers to damage small to large-scale businesses, and with the COVID-19 pandemic still happening, the situation is getting worse. While the possibility to work from the comfort of your own home is praised by employees, it creates cybersecurity challenges for enterprises. Some of the most common threats that organizations can become victims of are ransomware, phishing, and data breaches. The consequences of encountering such dangers can be detrimental. Read Complete article | |
Video: “PAM is a key driver to have a compliant and secure environment”
Posted by anna.vlasenko on 13 July 2021 04:50 PM |
|
The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task automation features will experience 70% fewer breaches than those that don’t.” The question of whether to have PAM in place is solved. If you want to have a stable business future, PAM is required. However, the selection of PAM is a complex process that can be confusing if you do not Read Complete article | |
Indeed PAM 2.3: enhanced tool for comprehensive cybersecurity
Posted by maya.ivanova on 20 October 2020 11:02 AM |
|
In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions to Indeed PAM Version 2.3. PERMITTED AND FORBIDDEN SSH COMMANDSVersion 2.3 allows setting up a list of permitted Read Complete article | |
On twisted way to ISO 27001 compliance, Indeed PAM is your first and main step
Posted by anna.vlasenko on 27 May 2020 09:49 AM |
|
The International Organization for Standardization is an internationally known and respected agency that manages and structures standards for multiple areas, including cybersecurity. ISO 27001 is ‘a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.’ The standard does not advertise any specific products or tools, it offers some sort of comprehensive and Read Complete article | |