Osirium PAM
Privileged Access Management
Osirium PPA
Privileged Process Automation
Osirium PEM
Privileged Endpoint Management
PAM Express
AD Audit Tool
PPA Express
PEM Audit Tool
Industries
Legal
Managed (Security) Service Providers
Education
Retail
Finance
Government and Defense
Healthcare
Industrial Control Systems
Manufacturing
Third party access
Ensure your third parties and vendors have the correct level of privileged access.
Compliance
Demonstrate rigorous compliance with GDPR, PCI DSS, NIST 800-53 and more.
About Osirium
News & Events
Management Team
Board of Directors
Investor Relations
Careers
Get Osirium PAM for Free
What is Privileged Process Automation?
Resellers and Distributors
Become a partner
Partner marketing support
Partner opportunity
Want to Partner with us?
Ensure your customers have the best PAM solution with the fastest time to realising value.
Blog
Case Studies
Datasheets
White Papers
Videos
PAM Integrations
Free Active Directory Audit Tool
Documentation
Support
News and insights from Osirium
January 12, 2021
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
Managing VMs is a pain, but Privileged Process Automation can safely automate the common tasks. See how ...
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.
There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation
A new type of automation is needed for DevOps
Privileged Access Security should be a priority. Osirium CTO, Andy Harris, explains why and lays out the roadmap for a solution.
Security updates need to be done right first time and automation ensures safe and accurate changes. See how in this blog.
In general VPN access is more risky than office based access, and there are some uncomfortable truths about humans and credentials.
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer
Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Developers need to install and configure Visual Studio and various add-ins to do their work. PEM lets them do their work without needing local admin rights
Both IAM and PAM are critical areas of cyber security delivering protection to different audiences
Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.
Privileged Process Automation (PPA) can be transformative for IT and business processes, find out how ....
There are a lot of assumptions about PAM and all the related terms like PPA, PEM, IAM and much more. Here's a simple guide to the jargon.
Getting the balance right between security and user productivity is really hard. With PEM, the balance can be restored so everyone's happy.
For many organisations, Slack has become the central core of communications between processes and people.
If you had the choice, what superpower would you have?
We’re often asked about high availability and fault tolerance for the PxM Platform.
PXM Platform reaches v6.5, see what's new
Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.
Where would the investor confidence be without the governance...
We’re very pleased to announce that the latest release, 2.2, is now available
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Osirium’s Privileged Process Automation (PPA) tool formerly known as Opus is the perfect complement to Ansible
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
Osirium’s PxM Platform provides Privileged Access Management (PAM) using the principle of identity-in / role-out
In this post, we're going to look at some aspects of automating a privileged process
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
One of the distinct advantages of Osirium’s PxM Platform is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks
Is it possible to automate IT tasks, improve security and improve customer service?
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
Secure automation needs more than just robots, you need privileged process automation.
Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
Osirium’s PxM Platform is specially designed to stop cyber-attackers from hacking NHS operations
If your Christmas party needs its people separated from pixels then PPM is not a product that we ship. Of course you can use PxM Express :-)
Ericsson and O2 engineers would have been flat out either updating certificates or software.
In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.
Since the PxM Platform is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
Osirium's PxM Platform can use both passwords and SSH Keys for the role-based connections where the device supports keys.
DevOps is hard enough, don't let the risk of exposing credentials make it worse.
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
A new set of tutorial videos to get you up and running fast
Across all industries, cyber-attacks continue to grow in number and severity. The education sector is becoming particularly targeted.
More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.
Robotic Process Automation (RPA) within our solutions for more than eight years in our Privileged Task Management module.
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Task automation has played an integral part in the PxM Platform since its very inception in 2008.
In the IT security world, with the last 12 months showing us terrifying data breaches, robots might just be the key to our salvation
Here’s the How-To video for using Osirium's PxM Platform with Elastic Stack.
The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.
Osirium's PxM Platform provides many business benefits that will keep the Board happy.
Here’s the problem for Osirium; Every cyber security company out there is suggesting that they address GDPR requirements.
Managed Security Service Providers face differing challenges to other industries we serve. With GDPR on the horizon, we discuss these unique needs.
Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security
Breaches may be daily news, but they will always be a significant worry for business stakeholders
NHS seeks to improve, the outsourcing of IT contracts has increased, and data security controls that should protect staff and patients
Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls
Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do
At Osirium, we created our Management Application Proxy Server (MAP Server)
A colossal 40% of malware attacks in the UK are made against public sector institutions
What would a data breach cost your business?
Ed’s presentation covered how we identify the good from the bad. In particular how the choice of good boundaries for Functions and API’s
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability
In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…
We’ve completed our integration with SailPoint’s Identity Governance solution
We’ve reworked the data to show both the risks in terms of impact and probability along with the trends
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence
In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about which they prefer doing
Taking Privileged Access Management (PAM) one step higher in security and compliance
Who can blame consumers now for being reluctant to switch from the Big Four?
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
The ability to view user behaviour provides an opportunity to highlight any anomalous activity
If you have any query or want to speak to one of our representative, please fill this form and we'll be in touch soon.