Security News

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
2024-04-09 05:30

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

Think Your MFA and PAM Solutions Protect You? Think Again
2023-09-18 12:21

A new report, produced by Osterman Research and commissioned by Silverfort, reveals that MFA and PAM solutions are almost never deployed comprehensively enough to provide resilience to identity threats. The identity attack surface is any organizational resource that can be accessed via username and password.

Webinar - Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges
2023-08-04 11:06

Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security and identity teams face inherent...

"It's The Service Accounts, Stupid": Why Do PAM Deployments Take (almost) Forever To Complete
2023-04-03 11:20

While there are various reasons for the difficulties PAM deployment introduces, the most prominent one regards the protection of service accounts. Service accounts are user accounts that are created for machine-to-machine communication.

Benefits of modern PAM: Efficiency, security, compliance
2022-07-26 04:00

Such traditional solutions cannot support large-scale cloud transformation initiatives requiring a modern PAM approach with automated and context-aware access controls. "You invest in modern infrastructure and application development tools. Shouldn't you invest in a modern PAM solution designed for the cloud or hybrid environment to protect it?".

How do I select a PAM solution for my business?
2021-02-01 05:30

To select a suitable PAM solution for your business, you need to think about a variety of factors. Ease of implementation and speed of deployment: There are a litany of examples of technology solutions failing to deliver anticipated benefits because they were not fully implemented, so your chosen PAM solution should easily integrate with the existing technology stack and enable rapid roll-out.

TPG Capital Acquires Majority Stake in PAM Solutions Provider Centrify
2021-01-29 04:42

Private equity firm TPG Capital on Thursday announced that it has agreed to acquire a majority stake in privileged access management solutions provider Centrify. Founded in 2004, Santa Clara, Calif.-based Centrify provides a platform designed to enforce least privilege access at scale, across enterprise networks.

Stealthbits SbPAM 3.0: A modernized and simplified approach to PAM
2020-09-30 00:30

Stealthbits announced the release of Stealthbits Privileged Activity Manager 3.0, their third-generation solution designed with a modernized and simplified approach to Privileged Access Management. SbPAM 3.0 continues Stealthbits' commitment to renovate and simplify PAM. The company approaches PAM from the perspective of the abundance of privileged activities that need to be performed, not a group of privileged admins needing accounts.

Saviynt converges PAM, IGA, and cloud security technologies in a single platform
2020-08-19 01:00

The latest release includes considerable security improvements to their Cloud PAM application, bolstering one of the only solutions to converge Identity Governance, Application Governance-Risk Management-and Compliance, and Privileged Access Management into a unified Identity Platform built for the cloud. The latest release of Saviynt's Cloud PAM provides improved governance, analytics, and access to privileged assets across enterprise applications and platforms including Google Cloud Platform.

Devolutions provides enterprise-grade PAM features to SMBs
2020-02-27 02:00

Leading the way is a Privileged Access Management solution called Devolutions Password Server, which provides enterprise-grade PAM features that offer SMBs a level of protection usually only afforded to large organizations. While every business is a potential target, SMBs face unique challenges from their enterprise counterparts - yet the majority of IT software solutions currently available are complex and go well beyond what most SMBs require.