Securing Remote Access with Osirium PAM
Remote access to IT systems for staff and third-parties needs to be approached carefully - see why Privileged Access Management (PAM) is key to working safely
Taking PAM To The Next Level With Automation
Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.
What is Privileged Access Security?
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
What is Privileged Access Management (PAM) and other strange acronyms?
There are a lot of assumptions about PAM and all the related terms like PPA, PEM, IAM and much more. Here's a simple guide to the jargon.
Are Privileged Access Management (PAM) and Identity Access Management (IAM) the same?
Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?
Protecting backups with PAM
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Welcome to 2021 - What's on Your New Year Plan?
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
Don't Be The Next Malware Victim
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
Simplifying Digital Security and Protection Compliance in the NHS
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
Cloudifying Multi-Factor Authentication for Privileged Access Management with RSA
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
How ready are you for a Cyber Essentials assessment?
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
NCSC Annual Report: The need for Privileged Access Management (PAM)
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
IAM v PAM as a single pane of glass for evaluating user security posture
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
URGENT - Update Your Domain Controllers now! But which ones ...?
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Why keep doing boring stuff when PPA is available for free?
Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.
Adaptive Authorisation vs Adaptive Authentication
Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation
Imagine If It Was Easy To Provision New Accounts
Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer
Imagine If Business Users Could Get Their Own AWS Data
Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...
PIM, PUM and PAM explained
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
Introducing Osirium PAM v7.0
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Secure Remote Privileged Access for Free
Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.
What is Privileged Process Automation
If you had the choice, what superpower would you have?
Fault-Tolerant, Highly-Available Privileged Access Management
We’re often asked about high availability and fault tolerance for the PxM Platform.
Introducing PXM Platform 6.5 – An overview of what’s new
PXM Platform reaches v6.5, see what's new
Controlling AWS Costs with PPA
Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.
Auditing Privileged Access Management
Where would the investor confidence be without the governance...
Announcing PPA 2.2
We’re very pleased to announce that the latest release, 2.2, is now available
Five Reasons Why You’ll Sleep Better with Privileged Access Management
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Multi-Factor Authentication: Osirium PxM and OneLogin
Osirium’s PxM Platform provides Privileged Access Management (PAM) using the principle of identity-in / role-out
Why you need PAM for Process Automation
In this post, we're going to look at some aspects of automating a privileged process
Infosec 2019 – Bigger than ever for Osirium
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
Securing Third Party Access
There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks
Secure IT Process Automation – Dream or Reality?
Is it possible to automate IT tasks, improve security and improve customer service?
Privileged Access Management and Essential Services
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
The journey through PAM, PTM and onto RPA
Secure automation needs more than just robots, you need privileged process automation.
What is Privileged Robotic Process Automation?
Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)
Privileged Access Management – Common Use Cases
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
Webinar: Why NHS security professionals need a new approach to PAM
Osirium’s PxM Platform is specially designed to stop cyber-attackers from hacking NHS operations
Privileged Pixel Management – A New Form of PxM
If your Christmas party needs its people separated from pixels then PPM is not a product that we ship. Of course you can use PxM Express :-)
The O2 outage, how task automation could help
Ericsson and O2 engineers would have been flat out either updating certificates or software.
Sharing Privileged Accounts With Third Parties
In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.
Fast-Slow or Slow-Fast? Two different approaches to digital transformation
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
Osirium and RazorSecure Strategic Alliance
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
Separate your business from cyber-attacks – Separate people from passwords
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.
Why PAM should be on every Operations Managers’ wish list
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
PxM Express Introductory Video Series
A new set of tutorial videos to get you up and running fast
The education sector must educate themselves on cyber-security
Across all industries, cyber-attacks continue to grow in number and severity. The education sector is becoming particularly targeted.
Why you shouldn’t be complacent about cloud security
More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.
Robotic Process Automation (RPA) and Task Automation
Robotic Process Automation (RPA) within our solutions for more than eight years in our Privileged Task Management module.
Analysts recognise Osirium’s Task Automation innovation
Task automation has played an integral part in the Osirium PAM since its very inception in 2008.
IT security, efficiency, and the robots making it happen
In the IT security world, with the last 12 months showing us terrifying data breaches, robots might just be the key to our salvation
Implementing the Dual Account model with Osirium’s PxM platform
The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.
Surprising benefits for the Board when you choose Osirium’s PxM
Osirium's PxM Platform provides many business benefits that will keep the Board happy.
Meeting significant GDPR needs using Osirium’s PAM
Here’s the problem for Osirium; Every cyber security company out there is suggesting that they address GDPR requirements.
Responding to the unique needs of M(S)SP’s
Managed Security Service Providers face differing challenges to other industries we serve. With GDPR on the horizon, we discuss these unique needs.
Cybersecurity – Making it everyone’s business is futile
Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security
Building a coping mechanism for data breaches
Breaches may be daily news, but they will always be a significant worry for business stakeholders
Cybersecurity in the NHS (part two) – Separating people from passwords
NHS seeks to improve, the outsourcing of IT contracts has increased, and data security controls that should protect staff and patients
So Why Privileged Account Management (PAM)?
Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls
Least Privileged Model with Privileged Account Management (PAM)
Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do
When the boss won’t budget for Privileged Access Management (PAM)
What would a data breach cost your business?
The rise and rise in cyber fraud (The ‘Insider Threat’)
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Cyber Essentials: the basics, and exactly why it is essential to you and your business
Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability
Privileged Access Management delivers the safety net
In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…
Privileged Access Management with SailPoint’s Identity Governance
We’ve completed our integration with SailPoint’s Identity Governance solution
World Economic Forum Rates Cyber Attack Risk
We’ve reworked the data to show both the risks in terms of impact and probability along with the trends
Notes from the Fraud Tube Spring Event
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
Watching The Insider Threat: So Why Privileged Access?
The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence
Privileged Task Management – Busy Work versus Thinking Work
In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about which they prefer doing
Osirium PxM ServiceNow Integration
Taking Privileged Access Management (PAM) one step higher in security and compliance
Tesco Bank resumes normal service, but has the damage been done…?
Who can blame consumers now for being reluctant to switch from the Big Four?
Creating resilience through security cells
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
Privileged User Analytics
The ability to view user behaviour provides an opportunity to highlight any anomalous activity
The Cost of Uncertainty
Today we’re hearing about the aftermath of an attack
Early versus late data breach outcomes
We spent some time looking at the outcomes for companies that were the victims of cyber breaches
IAM Round Table Notes
Yesterday we attended a round table session about building effective Identity and Access Management solutions
The JPMorgan Breach and the Problem with Passwords
Earlier this week US investigators charged three men after a multi-year cybercrime campaign
The year of the weekly data breach
Data breaches have fast become the scourge of modern enterprise
Separating people from passwords
Rigorous passwords policies are creating the exact opposite of their intended outcome
Osirium as an Identity Federator
The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.
Want to Follow GCHQ’s Best Practise Password Advice? Look No Further
If the documents leaked by NSA whitsleblower Edward Snowden are anything to go by, GCHQ knows a thing or two about exploiting security weaknesses.
US Government’s 30-Day Authentication Sprint Points the Way for UK Firms
The US OPM hack exposed – potentially to a nation state
How to present Cyber Security issues to the Board
If you’ve never attended a board meeting before I’ll try to give you a flavour of what happens
Why do IT administrators want Identity & Access Management?
IAM provides a wealth of operational conveniences alongside its security benefits
CISO Message to the Board about Breaches
Influence is often limited in the face of perceived business requirements
Hacking Team: Another Reason to Ditch Out-of-Date Password Systems
At Osirium, we believe in the need for a new approach to authentication
How Osirium defends against real world attacks
Dealing with the Insider and Third Party threats
What We Can Learn From the OPM Breach
Why are account credentials from privileged users so sought-after by attackers?
How Osirium’s PxM Platform defends against real world attacks
There is a serious threat against privileged accounts
Protecting POS: Why You Need to Guard Privileged Remote Accounts
Hackers have infiltrated POS systems via third party providers
Osirium Research Points Out Perils of Password Shoulder Surfing
The results should give IT managers plenty to think about
What is Shoulder Surfing?
Shoulder surfing, as the name suggests is the nefarious art of reading a sensitive piece of information over a user’s shoulder.
Privileged Account Abuse, Not Smartphone ‘Bans’ The GCHQ Story
Much of the talk in IT security circles over the past week has been centred around new guidance for businesses from the UK’s spy agency.
Targeted Attacks – The Fight Back Starts with Good Password Management
Targeted attacks have been around for probably a lot longer than many people think
Take Care with Third Parties
Do you feel confident about the security of your corporate account access controls?
Passwords aren’t the problem – people are
When the passwords meet people that the security breaks down