Automation: Taking Cybersecurity to a New Level
Automation is the key to better cybersecurity and better IT service. Find out how in this blog.
The Evolution of PAM
PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future
A real-world example of "shift left" IT support
Most IT Help Desks would love to let users do more for themselves - as long as it was safe. Read how it's possible with this case study from a GP practice
What's the right choice for automating IT processes?
There isn't "one size fits all" solution for IT Process Automation, so how do you make a choice? Find out in this blog
How Does Privileged Process Automation (PPA) Work?
Privileged Process Automation (PPA) can be transformative for IT Process Automation, find out how ....
Taking PAM To The Next Level With Automation
Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.
Why keep doing boring stuff when PPA is available for free?
Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.
Adaptive Authorisation vs Adaptive Authentication
Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation
Imagine If DevOps Environments Could Be Easily Automated
A new type of automation is needed for DevOps
Imagine If ... Network Operations Automation Was Easy
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
Imagine If It Was Easy To Provision New Accounts
Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer
Imagine If Business Users Could Get Their Own AWS Data
Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...
Imagine If Recertification Was Easy
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
Introducing PPA Task Builder - What do you want to automate
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
What is Privileged Process Automation
If you had the choice, what superpower would you have?
Controlling AWS Costs with PPA
Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.
Announcing PPA 2.2
We’re very pleased to announce that the latest release, 2.2, is now available
Why you need PAM for Process Automation
In this post, we're going to look at some aspects of automating a privileged process
Secure IT Process Automation – Dream or Reality?
Is it possible to automate IT tasks, improve security and improve customer service?
The journey through PAM, PTM and onto RPA
Secure automation needs more than just robots, you need privileged process automation.
What is Privileged Robotic Process Automation?
Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)
What are the different approaches to digital transformation
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
Robotic Process Automation (RPA) and Task Automation
Robotic Process Automation (RPA) within our solutions for more than eight years in our Privileged Task Management module.
Database Task Automation for Asterisk (AsteriskNOW)
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Analysts recognise Osirium’s Task Automation innovation
Task automation has played an integral part in the Osirium PAM since its very inception in 2008.
IT security, efficiency, and the robots making it happen
In the IT security world, with the last 12 months showing us terrifying data breaches, robots might just be the key to our salvation
When your biggest problems solved, you look to the next one
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
So What’s Wrong with Blacklisting Commands?
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences
Privileged Task Management – Busy Work versus Thinking Work
In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about which they prefer doing
Osirium PAM ServiceNow Integration
Taking Privileged Access Management (PAM) one step higher in security and compliance
Why do IT administrators want automation?
So why did a large proportion of administrators think that automation would make their life easier?
Osirium’s focus on Workflow usability means that organisations can benefit from security and productivity in tandem.
UK businesses need to review privilege policies
UK businesses warned to urgently review privileged credentials policies
Delegation failures suffocating UK businesses
Delegation failures suffocating UK businesses
Back-up protocols often ignore security devices
Review back up policies that extend beyond file servers and user access devices.