IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises

Privileged Access Management / PAM news stories - Page 2

Story image
SaaS
ThycoticCentrify builds on vision for modern PAM with latest integration
ThycoticCentrify has leveraged the ThycoticCentrify platform to integrate with Secret Server, its privileged account and session management solution.
Story image
ThycoticCentrify
Zero Trust means strong, frictionless PAM and other controls
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Privileged Access Management / PAM
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
Story image
Ransomware
Despite rising security budgets, businesses still paying ransom - report
The way cybercriminals use and manipulate ransomware in an effort to extract money from businesses has changed.
Story image
Privileged Access Management / PAM
ForgeRock named as Leader in Gartner MQ for Access Management
ForgeRock CEO Fran Rosch says the company is honoured to be named as a leader.
Story image
Privileged Access Management / PAM
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Story image
One Identity
One Identity extends identity security platform with OneLogin acquisition
“By adding OneLogin to our portfolio, and incorporating it into our cloud-first Unified Identity Security Platform, we can help customers holistically correlate all identities."
Story image
Privileged Access Management / PAM
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
Story image
One Identity
One Identity hits new milestone with latest PAM solution certification
One Identity has achieved Common Criteria certification by the National Information Association Partnership (NIAP) for its Safeguard for Privileged Passwords 6.7 privileged access management (PAM) solution.
Story image
Privileged Access Management / PAM
OneLogin solution to enable organisations to adopt Zero Trust principle of least privilege access
“For organisations to adopt a Zero Trust framework, they must embrace the concept of least privilege access."
Story image
Privileged Access Management / PAM
Thycotic and Centrify named as Leaders in Gartner MQ for Privileged Access Management
According to ThycoticCentrify CEO Art Gilliland, each company’s strengths noted in the report supports the position that the two companies work better together as one.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - BeyondTrust on securing critical infrastructure
In Techday's second IT Jam with BeyondTrust, we speak to the company's sales engineer Scott Hesford about critical infrastructure and how best to secure it.
Story image
Cloud
Microsoft partners with Vectra AI on Zero Trust security framework
Vectra AI has announced the Vectra Cognito platform will deliver key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers.
Story image
Internet of Things
Internet of Things in desperate need of more robust identity and access management
"IAM is yet another identity and security framework that poses significant challenges when crossing from the IT realm onto the IoT."
Story image
Privileged Access Management / PAM
Privileged access management vital as ransomware risks escalate
"PAM has become a key battleground in cyber security and the combined ThycoticCentrify is perfectly positioned to support our distribution channel partners and their customers."
Story image
Privileged Access Management / PAM
Misconfigured cloud services in SEA at risk of exploitation by threat actors
The most common misconfiguration included unrestricted outbound access to network ports that could be used to gain unauthorised entry into an organisation’s network.
Story image
Privileged Access Management / PAM
Imprivata extends PAM capabilities with Xton acquisition
"Through this acquisition, Imprivata will enable richer authentication and access management, a key pillar in the Imprivata digital identity framework, and broaden our mutual reach to new and current customers."
Story image
Cloud
ThycoticCentrify adds just-in-time workflows to Server Suite
The latest version of ThycoticCentrify's flagship PEDM solution now includes session audit data masking capabilities for UNIX, to reduce the risk of exposing potentially sensitive or highly restricted data.
Story image
Privileged Access Management / PAM
Attivo Networks launches CIEM solution to bolster identity management offerings
The solution is esigned to reduce the attack surface for entitlements and identities within the cloud.
Story image
Zero trust
Solving the problem of privilege with zero trust security
BeyondTrust’s Universal Privilege Management model recognises that securing passwords is not enough — privileges must be secured across environments.
Story image
BeyondTrust
How PAM can help to prevent major security disasters like Colonial Pipeline
When a cyber attack on the United States Colonial Pipeline erupted in May this year, the fallout was almost unthinkable.
Story image
Privileged Access Management / PAM
Why BeyondTrust privileged access management matters on AWS
A move to the cloud is a no-brainer for organisations that need flexibility and scalability in their IT systems - here's how to do privileged access management (PAM) right the first time.
Story image
10 Minute IT Jams
Video: 10 Minute IT Jams - Who is BeyondTrust?
In this IT Jam, Techday speaks to BeyondTrust director of solutions engineering Ajay Kumar, who discusses cybersecurity in 2021 and the role of PAM.
Story image
Cloud
ThycoticCentrify rolls out privileged management security features
ThycoticCentrify has added new privilege management security capabilities to Thycotic Privilege Manager and made additions to Thycotic Account Lifecycle Manager, its solution for service account governance.