5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM

Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation.

There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone

Read Complete article

Indeed Identity hosted Business Breakfast together with CreaPlus and
Posted by anna.vlasenko on 19 April 2022 03:21 PM

On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management.

Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has

Read Complete article

Privileged management use cases now extend across entire organizations, with users requiring task-based and workflow access to data, services, and applications held on legacy systems and multi-cloud-based infrastructures. And, of course, admins still need to perform those traditional privileged tasks. This change explains why PAM software, in general, has developed in the last few years. Both new and traditional vendors have responded well to demands for more advanced PAM capabilities suitable

Read Complete article

Slovenian card payment processor* as part of migration from Microsoft CLM / FIM (EOL) initiated the procedure of purchasing a Card Management System. After the implementation of the Indeed Certificate Manager we decided to ask them to share their experience and decision-making process.

Why did you consider implementing a CMS?

We tend to have an organized environment and have previous experience with MS CMS FIM. Clever, efficient, and secure use of digital certificates is extremely important

Read Complete article

Hackers have always had itchy fingers to damage small to large-scale businesses, and with the COVID-19 pandemic still happening, the situation is getting worse. While the possibility to work from the comfort of your own home is praised by employees, it creates cybersecurity challenges for enterprises.

Some of the most common threats that organizations can become victims of are ransomware, phishing, and data breaches. The consequences of encountering such dangers can be detrimental.

Read Complete article

Indeed CM 6.5: upscaled functionality for effortless PKI management
Posted by anna.vlasenko on 27 January 2022 01:34 PM

In the new version, we continue upscaling the Indeed Certificate Manager functionality. The new features will make it easier to manage your public key infrastructure. Please keep reading to learn more about the changes in Indeed CM 6.5.

Setting up subject name and subject alternative name for a Microsoft CA certificate by making a relevant request 

You can now use the device usage policy settings to customize a subject name and subject alternative name (SAN) for templates of Microsoft CA

Read Complete article

Indeed Identity and Cryptovision signed an official partnership agreement
Posted by anna.vlasenko on 06 December 2021 10:33 AM

At the beginning of December Konstantin Krasovskij, our EMEA Director, visited Trustech – a mix of trade show and conference, TRUSTECH showcases the latest hardware and technologies involved in the markets related to Payments, Identification and Security.

This year the event was hosted in Paris, it brought together many great experts and leaders. Once again we got a chance to meet with many of our existing and potential partners in person and discuss plans, opportunities and challenges that

Read Complete article

The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task automation features will experience 70% fewer breaches than those that don’t.”

The question of whether to have PAM in place is solved. If you want to have a stable business future, PAM is required. However, the selection of PAM is a complex process that can be confusing if you do not

Read Complete article

Video: Why is PAM a must-have for Singaporean financial sector?
Posted by maya.ivanova on 21 June 2021 01:30 PM

The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the value of well-thought cybersecurity and call for urgent actions to enhance the IT security status in the country. The Monetary Authority of Singapore (MAS) has already introduced a set of regulations in terms of privileged account management for financial institutions.

One of the MAS statements is «Users

Read Complete article

Indeed PAM 2.4: your fastest way to the future of cybersecurity
Posted by maya.ivanova on 24 May 2021 03:53 PM

Indeed Privileged Access Manager keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access management. Meet the latest release of Indeed PAM 2.4:

Use concurrent session licensing

The newly added Indeed PAM licensing scheme is based on the number of sessions. This type of license limits the number of concurrent active sessions in Indeed PAM without restricting the number

Read Complete article