News
Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM

Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8.

Migration to .NET 6

Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. 

User authentication support with RADIUS

Axidian Privilege 2.8 supports user authentication with RADIUS. You can


Read Complete article

The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of


Read Complete article

Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness.

Using Linux-based systems for Indeed PAM control server

Version 2.7 enables you to install


Read Complete article

Cyber Security World Asia returned this year and was held on 12th – 13th October 2022 at Marina Bay Sands, Singapore.

The event gathered cyber security professionals and business leaders with experts, solutions and services to help accelerate digital transformation plans. This year Indeed Identity was amongst those experts and participated in this leading technology event as a bronze sponsor. For two days we were presenting authentication and comprehensive access management, PAM and


Read Complete article

Implementing the Principle of Least Privilege is easier than you think
Posted by anna.vlasenko on 21 September 2022 01:18 PM

IT security resilience of an organization highly depends on how effectively privileged users work with its IT infrastructure. As the saying goes – with great power comes great responsibility. The question is – do you rely on the privileged users to be in control of your IT infrastructure security and stability or do you take matters in your own hands?

Forrester Research estimates at least 80% of security breaches involve privileged credentials. Such incidents as those which happened in


Read Complete article

5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM

Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation.

There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone


Read Complete article

Indeed PAM 2.3: enhanced tool for comprehensive cybersecurity
Posted by maya.ivanova on 20 October 2020 11:02 AM

In the new release, we continue upscaling the Indeed Privileged Access Manager functionality. New important access control features, expanded user session management options, and improved user experience for a number of scenarios have been added to make Indeed PAM even more functional and convenient management tool. Let’s take a closer look at the following additions to Indeed PAM Version 2.3.

PERMITTED AND FORBIDDEN SSH COMMANDS

Version 2.3 allows setting up a list of permitted


Read Complete article

How to choose the most cost-effective PAM licensing model
Posted by anna.vlasenko on 07 October 2020 10:18 AM

Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the dramatic increase in the number of privileged users which simultaneously widens the area for hackers’ attacks. Corporate budgets are either frozen or reconsidered and you need to find the most cost-effective PAM? Consider Indeed Privileged Access Manager, a software that controls, protects and audits


Read Complete article

It is a wide-spread misconception that small and medium enterprises should not focus on enhancing cybersecurity. Operating business and providing services to customers means being on the hackers’ radar. Attackers take advantage of SMB’s cyber vulnerabilities and get what they want with minimum efforts. Industrial espionage, data theft for its subsequent selling, blackmail can be a sad story of small and medium enterprises, too. So how do you make a cybersecurity tragedy into a


Read Complete article

In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to help financial institutions protect sensitive information and transactions and discover secret weaknesses in the cybersecurity policy. 

In part 11.2 of the TRM Guidelines ‘Privileged Access Management’, the MAS attracts the attention of financial institutions to the importance


Read Complete article