News
Webinar: Conquering Cyber Threats in the New Normal
Posted by anna.vlasenko on 21 May 2020 11:30 AM

Welcome to the free online webinar Conquering cyber threats in the new normal” prepared by Pointwest and Indeed Identity, leading companies with expertise in cybersecurity.

In regard to the present-day events, the Philippines officials tighten massive lockdown. The number of remote working employees has significantly increased during the last months along with the number of fishing attacks and data breaches. This situation definitely influences the business flow of companies and


Read Complete article

We are happy to announce the new version of Indeed PAM, a software suite for managing privileged accounts. Version 2.1 introduces PostgreSQL storage support, import of resources from Active Directory and new functionality to manage permissions and user sessions. Please read on to learn more about these and other new features.

PostgreSQL support

In previous versions of Indeed PAM, only Microsoft SQL Server and its free version Microsoft SQL Express were used to manage


Read Complete article

Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. Ask any IT manager and he/she will agree with it. So how come that privilege misuse is still one of the 3 top-patterns most often associated with breaches?

If you also understand the big risks of unregulated privileged accounts and if you want to be 100% aware of all their


Read Complete article

Protect PHI and PII from employee misuse of privileged access
Posted by anna.vlasenko on 16 January 2020 11:32 AM

The modern healthcare system is rapidly changing with new and evolving technologies and equipment. 

These high-tech innovative technologies are replacing paper and it is clear that healthcare specialists should pay attention to, and focus on, organizational and technical issues, including the implementation of electronic medical records. It is also vitally important to maintain effective cost control of materials as well as optimizing costs whilst maintaining the quality of


Read Complete article

Indeed Privileged Access Manager (Indeed PAM) – version 2.0
Posted by anna.vlasenko on 04 December 2019 11:29 AM

We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The main additional features of Indeed Privileged Access Manager version 2.0 are dedicated SSH Proxy component, DBMS accounts management and command-line utility for managing solution settings. These and other specifications are below.

SSH PROXY 

The SSH Proxy has been developed for the Indeed PAM 2.0 software package to monitor SSH sessions without using


Read Complete article

Indeed Privileged Access Manager (Indeed PAM) – version 1.2
Posted by anna.vlasenko on 21 October 2019 11:55 AM

We introduce the next version of Indeed Privileged Access Manager software for access control of privileged users. The new Indeed PAM 1.2 version has not only the revision of the existing functionality, but also new features, as well as tools to automate administration processes. They are designed to increase the flexibility and convenience for administrators and users. More about improvements permitting mechanism, added features and tools, see below.

СONTROL OF
Read Complete article

Indeed Privileged Access Manager (Indeed PAM) 1.1
Posted by anna.vlasenko on 10 June 2019 01:54 PM

Less than a year ago, we introduced a new software suite to manage access to privileged accounts – Indeed Privileged Access Manager (Indeed PAM).

The pilot implementations of Indeed PAM 1.0 were performed in enterprise informational systems in the first months after release. As a result, we received positive customer feedback on the product and suggestions for its development.

The Indeed PAM 1.1 features planned addons and functions implemented according to


Read Complete article

Password management for privileged users is the best practice
Posted by anna.vlasenko on 29 April 2019 03:36 PM

Almost all of business critical data is stored in various information systems of a company. Business scaling leads to a need to delegate administrative responsibilities to subordinates completely or partially, or extend the privileges of top management employees. 

Therefore the heads of departments that use privileged accounts get access to additional confidential data. It is often the case that the access is granted without using a reliable system of controlling the


Read Complete article

How to find out what privileged accounts are used for by employees?
Posted by anna.vlasenko on 26 April 2019 01:41 PM
Priveleged access manager

Management of risks – both reputation and financial – is one of the most important business tasks. Confidential information and internal regulations of any company is a higher priority target of business intelligence and competition. Protection of such data is a matter of confidence and high responsibility. Therefore, not all users of business information systems have privileged accounts. 

However, the presence of privileged users proper does not guarantee protection from data


Read Complete article


   Newer Posts