close icon
Home Page
Products

Products

PAM logo
Privileged Access Management
PEM logo
Endpoint Privilege Management
PPA logo
Automation
Industries

Industries

school_line
Education
bank_line
Finance
government_line
Government and Defence
hospital_line
Healthcare
computer_line
IT Operations
settings_5_line
Industrial Control Systems
briefcase_line
Legal
store_2_line
Retail
Partners

Partners

Resellers and Distributors
Partner marketing support
Partner opportunity
Resources

Resources

tool_line
Free Tools
bookmark_line
Blog
file_search_line
Case Studies
usb_line
PAM Integrations
video_line
Videos
Webinars
paper_line
White Papers
book_2_line
Osirium University
news_line
Documentation
Company

Company

IDcard_line
About
news_line
News & Events
Team
Investor Hub
Software reviews gold medal
See the report
search_3_line
BOOK A DEMO
>
home
▸
resources
▸
Blog

Identity & Access Management

Osirium blogs related to Identity Access Management or Governance
Mark Warren
Mark Warren
14
November 2022

Preventing ransomware from being devastating

The ransomware attack at MediBank has many of the classic elements of a ransomware attack. How could they be avoided?

Mark Warren
Mark Warren
4
November 2022

Automation: Taking Cybersecurity to a New Level

Automation is the key to better cybersecurity and better IT service. Find out how in this blog.

Mark Warren
Mark Warren
29
July 2022

The Evolution of PAM

PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future

Andy Harris
Andy Harris
19
July 2022

Ransomware Payload Types Including Brickers and Wipers

Ransomware covers many different types of attack, the latest being "Brickers" and "Wipers" find out more and how to defend against them in this blog.

Mark Warren
Mark Warren
5
April 2022

The State of UK Cyber Security Attacks in 2022

Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.

Mark Warren
Mark Warren
23
February 2022

Boosting Cyber Resilience

How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency

Mark Warren
Mark Warren
28
January 2022

Linux PolicyKit vulnerability no risk for Osirium PAM

Long-term vulnerability in Linux poses no risk for Osirium PAM

Andy Harris
Andy Harris
21
January 2022

AutoCAD and Local Admin Accounts - reducing risk

Removing the risk of local admin without impacting AutoCAD users

Andy Harris
Andy Harris
14
December 2021

Apache Log4j Vulnerability

A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...

Andy Harris
Andy Harris
1
December 2021

Passwordless Authentication for PAM with Authlogics

Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...

Mark Warren
Mark Warren
29
October 2021

MSPs and Ransomware - the weakest link

MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients

Mark Warren
Mark Warren
10
September 2021

Are businesses doing enough to protect against ransomware?

New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...

Mark Warren
Mark Warren
30
July 2021

Record High Costs of Data Breach

The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.

Andy Harris
Andy Harris
14
June 2021

Implementing Zero Trust with Osirium products

Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.

Andy Harris
Andy Harris
5
February 2021

What is Privileged Access Security?

At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies

Andy Harris
Andy Harris
2
February 2021

Are PAM and IAM the same? Let us explain the difference

Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?

Mark Warren
Mark Warren
5
January 2021

Welcome to 2021 - What's on Your New Year Plan?

Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.

Mark Warren
Mark Warren
27
November 2020

Don't Be The Next Malware Victim

There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...

Andy Harris
Andy Harris
10
November 2020

Cloud MFA for PAM with RSA

The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.

Andy Harris
Andy Harris
27
October 2020

IAM v PAM - best option for user security?

IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.

Mark Warren
Mark Warren
17
September 2020

A bad week for universities targeted in cyberattacks

There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?

Andy Harris
Andy Harris
15
July 2020

Privileged Access Security - A Deeper Dive

Privileged Access Security should be a priority. Osirium CTO, Andy Harris, explains why and lays out the roadmap for a solution.

Andy Harris
Andy Harris
29
June 2020

Some Inconvenient Truths About Credentials and Remote Access

In general VPN access is more risky than office based access, and there are some uncomfortable truths about humans and credentials.

Mark Warren
Mark Warren
7
April 2020

Introducing Osirium PAM v7.0

There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...

Andy Harris
Andy Harris
17
September 2019

PAM - Fault-Tolerant and Highly-Available

We’re often asked about high availability and fault tolerance for Osirium PAM

Mark Warren
Mark Warren
10
September 2019

Introducing PXM Platform 6.5 – What’s New?

PXM Platform reaches v6.5, see what's new

Andy Harris
Andy Harris
8
August 2019

Five Reasons Why You'll Sleep Better with Osirium's PAM

If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …

Andy Harris
Andy Harris
30
July 2019

Multi-Factor Authentication: Osirium PAM and OneLogin

Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out

Mark Warren
Mark Warren
6
June 2019

Infosec 2019 – Bigger than ever for Osirium

In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days

Andy Harris
Andy Harris
31
May 2019

Privileged Access to Web Apps – A Magical Solution

One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems

Mark Warren
Mark Warren
18
March 2019

Thoughts on Cloud and Cyber Security Expo 2019

Reflections on Cloud and Cyber Security Expo 2019

Andy Harris
Andy Harris
8
February 2019

Privileged Access Management – Common Use Cases

PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use

Andy Harris
Andy Harris
27
September 2018

IoT, Internet of Things is not a good term…

First off, the first main issue is the word 'Things', it is too general. Things break down into different categories

Andy Harris
Andy Harris
21
September 2018

Osirium and RazorSecure Strategic Alliance

Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.

Andy Harris
Andy Harris
9
August 2018

How to separate your business from cyber-attacks

The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.

Andy Harris
Andy Harris
29
June 2018

Multi-factor Authentication in Osirium PAM 6.1.0

Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.

Andy Harris
Andy Harris
13
May 2018

PAM Express Introductory Video Series

A new set of tutorial videos to get you up and running fast with Osirium PAM Express

Osirium
Osirium
6
April 2018

Why you shouldn’t be complacent about cloud security

More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.

Andy Harris
Andy Harris
15
March 2018

Implementing the Dual Account model with Osirium PAM

The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.

Andy Harris
Andy Harris
26
February 2018

Benefits for the Board when you choose Osirium’s PAM

Osirium's PAM provides many business benefits that will keep the Board happy.

Andy Harris
Andy Harris
21
February 2018

Building a coping mechanism for data breaches

Breaches may be daily news, but they will always be a significant worry for business stakeholders

Andy Harris
Andy Harris
21
February 2018

Cybersecurity – Making it everyone’s business is futile

Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security

Osirium
Osirium
3
February 2018

So Why Privileged Account Management (PAM)?

Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls

Andy Harris
Andy Harris
1
February 2018

Least Privileged Model with PAM

Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do

Andy Harris
Andy Harris
24
January 2018

MAP Server – Protecting legacy applications

At Osirium, we created our Management Application Proxy Server (MAP Server)

Osirium
Osirium
12
April 2017

Privileged Access Management delivers the safety net

In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…

Osirium
Osirium
31
March 2017

Watching The Insider Threat: So Why Privileged Access?

The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence

Andy Harris
Andy Harris
22
September 2016

The Cost of Uncertainty

Today we’re hearing about the aftermath of an attack

Andy Harris
Andy Harris
6
September 2016

Two Ideas

We’ve heard a couple of deployment ideas recently

Andy Harris
Andy Harris
20
April 2016

IAM Round Table Notes

Yesterday we attended a round table session about building effective Identity and Access Management solutions

Andy Harris
Andy Harris
23
October 2015

Separating people from passwords

Rigorous password policies are creating the exact opposite of their intended outcome

Andy Harris
Andy Harris
6
October 2015

Osirium as an Identity Federator

The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.

Andy Harris
Andy Harris
26
September 2015

Want to Follow GCHQ’s Best Practise Password Advice?

If the documents leaked by NSA whitsleblower Edward Snowden are anything to go by, GCHQ knows a thing or two about exploiting security weaknesses.

Andy Harris
Andy Harris
3
August 2015

Highlighting the weakness of human generated passwords

Passwords are one of the biggest threats to enterprise data security around today

Andy Harris
Andy Harris
27
July 2015

Why do IT administrators want Identity & Access Management?

IAM provides a wealth of operational conveniences alongside its security benefits

Topics

All
Audit, Compliance and Governance
Automation
DevOps
Education
Endpoint Privilege Management
GDPR
Healthcare
IT Process Automation
Identity & Access Management
Managed (Security) Service Provider
Manager
Privileged Access Management
Privileged Access Security
Privileged Process Automation
Ransomware
Technical
Third-Party Access

Authors

Andy Harris
Cameron Harris
Carlos Ruiz
David Guyatt
James Nadal
Mairi Chisholm
Mark Warren
Osirium
Tom Hills
Back to top

Want to know more?

If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.

+44 (0) 118 324 2444
Thank you! Your submission has been received and we'll be in touch
Oops! Something went wrong while submitting the form.
Home Page
cyber essentials certified badge
Industries
EducationFinanceGovernment and DefenceHealthcareIT OperationsIndustrial Control SystemsLegalRetail
Company
AboutTeamBoard of DirectorsInvestor HubJob Opportunities
Resources
Free ToolsBlogPAM IntegrationsVideosWebinarsWhitepapersDatasheetsDocumentationCase Studies
Support
Support PortalOsirium University
© 2023 OSIRIUM. All rights reserved.
AccessibilityPrivacy PolicyEULATerms of ServiceSitemap