privileged access management

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor

  Following a record year of sales growth, Fudo Security is truly earning the title of “the fastest growing PAM vendor in the world.” The company experienced a stunning 83% year-over-year growth in Fudo PAM sales between H1 2018 and H1 2019. In addition to this, the company also saw its customers increase by 42% …

PRESS RELEASE: Fudo Security Likely The Fastest Growing PAM Vendor Read More »

Data breach at the border. Are your subcontractors an easy target?

It’s near-impossible to travel anywhere today without submitting to the most extensive of security checks. We know of the pat-downs, the metal detectors, the shoes off, the interviews at airports. Increasingly, biometric fingerprint and facial scans are being implemented to add “convenience” for travellers. Opting out can be prohibitively difficult. Sometimes there is no choice–if …

Data breach at the border. Are your subcontractors an easy target? Read More »

Why Privileged Access Management is Important & Crucial for all Businesses

The number of reported instances of data breaches in different organizations increases with each passing day. Businesses are feeling the frustrations that follow such occurrences. In 2019 during the World Economic Forum, cyber attacks and data breaches ranked fourth and fifth respectively for two consecutive years as the globe’s most dangerous risks. A practical case …

Why Privileged Access Management is Important & Crucial for all Businesses Read More »

Fudo 3.9 Update Release Notes

This is Fudo maintenance release, introducing improvements to stability and bug fixes. It is a milestone towards upcoming system-wide Fudo upgrades. Fudo 3.9 changes list: New: RADIUS challange-response support; available for RDP, SSH, VNC and Admin Panel & User Portal. Swiss and German keyboard support for RDP login. Improved: A lot of new reports: by …

Fudo 3.9 Update Release Notes Read More »

Agent or Agentless approach?

Some say, that both agent and agentless approach in IT security has its own advantages and disadvantages. In general, agents as small pieces of software are often seen as efficient and reliable way of gathering lots of data from a system they are installed on while agentless approach relies on industry standards to provide information …

Agent or Agentless approach? Read More »