Indeed AM 8.1: elevated performance of employee access management

A little over a year ago, we released a brand new update of our software suite designed for strong employee authentication. The solution has reached a new level of managing employee access to any information system used by any company. And again we are ready to share with you the achievement of a new stage […]

more

Indeed PAM 2.6: modern response to potential threats

The Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log analysis easier and improve account management. Text record search across all sessions The updated text log search feature allows you to quickly find entered commands. The search […]

more

Building Mindset for Privileged Account Management

For most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due to the legal regulations and do not see it as an investment but rather consider cybersecurity as a cost center. Moreover, most employees think of it as another layer of control and make […]

more

Indeed PAM Desktop Console: security and usability that go hand in hand

Usability is an important attribute of any software. In addition to enhancing the functionality of Indeed Privileged Access Manager with each new release, we aim to make it more user-friendly and easier to use, thus improving user experience. The Indeed PAM 2.5 release has a significant innovation intended for the end users of the system. […]

more

Indeed PAM 2.5: user experience is a key to resilient cybersecurity

Indeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features and improvements in the user and administrator interface, as well as additional connectors to target resources. Please see below for an overview of the new release. New access policy mechanism Indeed PAM relies on […]

more
13.07.2021

Video: “PAM is a key driver to have a compliant and secure environment”

The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task automation features will experience 70% fewer breaches than those that don’t.” The question of whether to have PAM in place is solved. If you want to have […]

more

Video: Why is PAM a must-have for Singaporean financial sector?

The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the value of well-thought cybersecurity and call for urgent actions to enhance the IT security status in the country. The Monetary Authority of Singapore (MAS) has already introduced […]

more

Indeed PAM 2.4: your fastest way to the future of cybersecurity

Indeed Privileged Access Manager keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access management. Meet the latest release of Indeed PAM 2.4: Use concurrent session licensing The newly added Indeed PAM licensing scheme is based on the number […]

more
16.04.2021

Roundtable: Best PAM approach – what requires your full attention

Privileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the upcoming years, PAM implementation the #1 priority for many companies in Turkey.  The selection of PAM is a complex process that can be confusing if you do not know where to start. Day […]

more

Secure authentication in your pocket – meet newest release of Indeed Key 2.1

When it comes to multi-factor authentication, any cybersecurity officer knows – usability is a must step toward users’ acceptance of the technology. The product will be ignored if it is not user-friendly.  Here is where Indeed Key comes to the rescue. It is a mobile application that transforms a smartphone into an easy-to-use security tool […]

more