Indeed PAM 2.6: modern response to potential threats

The Indeed PAM software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log analysis easier and improve account management. Text record search across all sessions The updated text log search feature allows you to quickly find entered commands. The search […]

more

Building Mindset for Privileged Account Management

For most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due to the legal regulations and do not see it as an investment but rather consider cybersecurity as a cost center. Moreover, most employees think of it as another layer of control and make […]

more

Indeed PAM Desktop Console: security and usability that go hand in hand

Usability is an important attribute of any software. In addition to enhancing the functionality of Indeed Privileged Access Manager with each new release, we aim to make it more user-friendly and easier to use, thus improving user experience. The Indeed PAM 2.5 release has a significant innovation intended for the end users of the system. […]

more

Indeed PAM 2.5: user experience is a key to resilient cybersecurity

Indeed Identity presents a new version of Indeed Privileged Access Manager. Indeed PAM 2.5 offers enhanced access policy mechanisms, new features and improvements in the user and administrator interface, as well as additional connectors to target resources. Please see below for an overview of the new release. New access policy mechanism Indeed PAM relies on […]

more

Video: Why is PAM a must-have for Singaporean financial sector?

The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the value of well-thought cybersecurity and call for urgent actions to enhance the IT security status in the country. The Monetary Authority of Singapore (MAS) has already introduced […]

more

Indeed PAM 2.4: your fastest way to the future of cybersecurity

Indeed Privileged Access Manager keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access management. Meet the latest release of Indeed PAM 2.4: Use concurrent session licensing The newly added Indeed PAM licensing scheme is based on the number […]

more

Indeed PAM brings financial institutions to MAS compliance – fast and easy

In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to help financial institutions protect sensitive information and transactions and discover secret weaknesses in the cybersecurity policy. 

more

Indeed PAM 2.3: enhanced tool for comprehensive cybersecurity

In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions […]

more

How to choose the most cost-effective PAM licensing model

Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the dramatic increase in the number of privileged users which simultaneously widens the area for hackers’ attacks. Corporate budgets are either frozen or reconsidered and you need to […]

more

From chaos to protected privileged access: Exclusive offer to SMB on PAM supply

It is a wide-spread misconception that small and medium enterprises should not focus on enhancing cybersecurity. Operating business and providing services to customers means being on the hackers’ radar. Attackers take advantage of SMB’s cyber vulnerabilities and get what they want with minimum efforts. Industrial espionage, data theft for its subsequent selling, blackmail can be […]

more