In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions […]
Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the dramatic increase in the number of privileged users which simultaneously widens the area for hackers’ attacks. Corporate budgets are either frozen or reconsidered and you need to […]
It is a wide-spread misconception that small and medium enterprises should not focus on enhancing cybersecurity. Operating business and providing services to customers means being on the hackers’ radar. Attackers take advantage of SMB’s cyber vulnerabilities and get what they want with minimum efforts. Industrial espionage, data theft for its subsequent selling, blackmail can be […]
In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to help financial institutions protect sensitive information and transactions and discover secret weaknesses in the cybersecurity policy.
The International Organization for Standardization is an internationally known and respected agency that manages and structures standards for multiple areas, including cybersecurity. ISO 27001 is ‘a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.’ The standard does not […]
We are happy to announce the new version of Indeed PAM, a software suite for managing privileged accounts. Version 2.1 introduces PostgreSQL storage support, import of resources from Active Directory and new functionality to manage permissions and user sessions. Please read on to learn more about these and other new features.
Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. Ask any IT manager and he/she will agree with it. So how come that privilege misuse is still one of the 3 top-patterns most often […]
The modern healthcare system is rapidly changing with new and evolving technologies and equipment. These high-tech innovative technologies are replacing paper and it is clear that healthcare specialists should pay attention to, and focus on, organizational and technical issues, including the implementation of electronic medical records. It is also vitally important to maintain effective cost […]
We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The main additional features of Indeed Privileged Access Manager version 2.0 are dedicated SSH Proxy component, DBMS accounts management and command-line utility for managing solution settings. These and other specifications are below. SSH PROXY The SSH Proxy has […]
We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The new Indeed PAM 1.2 version has not only the revision of the existing functionality, but also new features, as well as tools to automate administration processes. They are designed to increase the flexibility and convenience for administrators […]