privileged access management

The top 5 stories from across the global tech world!

From whistleblowers to dating tv, read our countdown of the top 5 stories from across the global tech world. Number 5- Snapchat goes 3D! If you can’t get enough of making selfies, then I have JUST the thing for you! Now with Snapchat upping its game, it has introduced a new camera mode that can […]

The top 5 stories from across the global tech world! Read More »

From whistleblowers to dating tv, read our countdown of the top 5 stories from across the global tech world. Number 5- Snapchat goes 3D! If you can’t get enough of making selfies, then I have JUST the thing for you! Now with Snapchat upping its game, it has introduced a new camera mode that can

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42%

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor Read More »

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42%

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Data breach at the border. Are your subcontractors an easy target? Read More »

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if

Why Privileged Access Management is Important & Crucial for all Businesses

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case

Why Privileged Access Management is Important & Crucial for all Businesses Read More »

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case

Fudo 3.9 Update Release Notes

This is Fudo maintenance release, introducing improvements to stability and bug fixes. It is a milestone towards upcoming system-wide Fudo upgrades. Fudo 3.9 changes list: New: RADIUS challange-response support; available for RDP, SSH, VNC and Admin Panel & User Portal. Swiss and German keyboard support for RDP login. Improved: A lot of new reports: by

Fudo 3.9 Update Release Notes Read More »

This is Fudo maintenance release, introducing improvements to stability and bug fixes. It is a milestone towards upcoming system-wide Fudo upgrades. Fudo 3.9 changes list: New: RADIUS challange-response support; available for RDP, SSH, VNC and Admin Panel & User Portal. Swiss and German keyboard support for RDP login. Improved: A lot of new reports: by

How to speed up ROI with PAM solutions?

Talking about ROI with every security solution is always tough. Why? Because we need to talk about what issues could befall us if we decide not to implement the given product. We have to talk about the loss. This can include real financial loss caused by criminals and problems which are intangible  – like brand

How to speed up ROI with PAM solutions? Read More »

Talking about ROI with every security solution is always tough. Why? Because we need to talk about what issues could befall us if we decide not to implement the given product. We have to talk about the loss. This can include real financial loss caused by criminals and problems which are intangible  – like brand

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information

Agent or Agentless approach? Read More »

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information