close icon
Home Page
Products

Products

PAM logo
Privileged Access Management
PEM logo
Endpoint Privilege Management
PPA logo
Automation
Industries

Industries

school_line
Education
bank_line
Finance
government_line
Government and Defence
hospital_line
Healthcare
computer_line
IT Operations
settings_5_line
Industrial Control Systems
briefcase_line
Legal
store_2_line
Retail
Partners

Partners

Resellers and Distributors
Partner marketing support
Partner opportunity
Resources

Resources

tool_line
Free Tools
bookmark_line
Blog
file_search_line
Case Studies
usb_line
PAM Integrations
video_line
Videos
Webinars
paper_line
White Papers
book_2_line
Osirium University
news_line
Documentation
Company

Company

IDcard_line
About
news_line
News & Events
Team
Investor Hub
Software reviews gold medal
See the report
search_3_line
BOOK A DEMO
>
home
▸
resources
▸
Blog

Manager

Osirium blogs intended for a manager or leader audience
Mark Warren
Mark Warren
24
July 2023

How do I make the most of EPM?

EPM is a critical cyber security defence, but how can you ensure it gets used and provides the expected protection?

Mark Warren
Mark Warren
21
July 2023

What is EPM and why should I care?

What is endpoint privilege management and how important is it?

Cameron Harris
Cameron Harris
23
February 2023

Dangers of local admin rights: native Azure AD (Entra ID) support arrives for PEM

Allowing employees to have local admin rights is fraught with dangers for all firms. But Osirium PEM, now with 100% native Azure AD support, offers a solution.

Stuart McGregor
Stuart McGregor
2
February 2023

Enhanced solutions in 2023 to combat the evolving cyber threat

Exploring the subject of rising threats from cyber criminals and ransomware attacks.

Andy Harris
Andy Harris
30
January 2023

Education a target for ransomware in 2023

Is education a prime target for ransomware attackers in 2023?

Mark Warren
Mark Warren
14
November 2022

Preventing ransomware from being devastating

The ransomware attack at MediBank has many of the classic elements of a ransomware attack. How could they be avoided?

Mark Warren
Mark Warren
4
November 2022

Automation: Taking Cybersecurity to a New Level

Automation is the key to better cybersecurity and better IT service. Find out how in this blog.

Mark Warren
Mark Warren
29
July 2022

The Evolution of PAM

PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future

Mark Warren
Mark Warren
27
June 2022

A real-world example of "shift left" IT support

Most IT Help Desks would love to let users do more for themselves - as long as it was safe. Read how it's possible with this case study from a GP practice.

Mark Warren
Mark Warren
17
June 2022

Choosing an endpoint security solution - keep focused!

When choosing a solution to secure endpoints, don't be distracted by unnecessary features - find out how in this blog

Mark Warren
Mark Warren
9
June 2022

What's the right choice for automating IT processes?

There isn't "one size fits all" solution for IT Process Automation, so how do you make a choice? Find out in this blog

Mark Warren
Mark Warren
5
April 2022

The State of UK Cyber Security Attacks in 2022

Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.

Mark Warren
Mark Warren
23
February 2022

Boosting Cyber Resilience

How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency

Andy Harris
Andy Harris
21
January 2022

AutoCAD and Local Admin Accounts - reducing risk

Removing the risk of local admin without impacting AutoCAD users

Mark Warren
Mark Warren
19
January 2022

Launch of Osirium's PAM v8.0 - MFA, JIT, and lots more

The latest release of Osirium PAM bring scheduled JIT, MFA and much more.

Andy Harris
Andy Harris
14
December 2021

Apache Log4j Vulnerability

A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...

Mark Warren
Mark Warren
29
October 2021

MSPs and Ransomware - the weakest link

MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients

Mark Warren
Mark Warren
10
September 2021

Are businesses doing enough to protect against ransomware?

New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...

Mark Warren
Mark Warren
30
July 2021

Record High Costs of Data Breach

The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.

Andy Harris
Andy Harris
14
June 2021

Implementing Zero Trust with Osirium products

Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.

Mark Warren
Mark Warren
24
May 2021

CyberUK 2021 Highlights

A summary of the recent CyberUK 2021 conference, including protecting the NHS and education sector from ransomware.

Andy Harris
Andy Harris
21
April 2021

Supply Chain Threats And MSPs

Many organizations depend on MSPs and MSSPs. This article discusses why MSP security is critical to protect themselves and their clients.

Andy Harris
Andy Harris
8
April 2021

Ransomware: The threat and blocking lateral movement

Understanding the threat and blocking lateral movement from ransomware

Tom Hills
Tom Hills
18
March 2021

Securing Remote Access with Osirium PAM

Remote access to IT systems for staff and third-parties needs to be approached carefully - see why Privileged Access Management (PAM) is key to working safely

Mark Warren
Mark Warren
3
March 2021

Taking PAM To The Next Level With Automation

Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.

Andy Harris
Andy Harris
5
February 2021

What is Privileged Access Security?

At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies

Andy Harris
Andy Harris
2
February 2021

Are PAM and IAM the same? Let us explain the difference

Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?

Andy Harris
Andy Harris
12
January 2021

Protecting backups with PAM

Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...

Mark Warren
Mark Warren
5
January 2021

Welcome to 2021 - What's on Your New Year Plan?

Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.

Mark Warren
Mark Warren
27
November 2020

Don't Be The Next Malware Victim

There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...

Mark Warren
Mark Warren
11
November 2020

Simple DSP Compliance in the NHS

For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.

Andy Harris
Andy Harris
10
November 2020

Cloud MFA for PAM with RSA

The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.

Mark Warren
Mark Warren
4
November 2020

How ready are you for a Cyber Essentials assessment?

Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.

Mark Warren
Mark Warren
3
November 2020

NCSC Annual Report: The need for Osirium's PAM

The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM

Andy Harris
Andy Harris
27
October 2020

IAM v PAM - best option for user security?

IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.

Mark Warren
Mark Warren
1
October 2020

How to know which Domain Controllers need updates

Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help

Mark Warren
Mark Warren
29
September 2020

Why keep doing boring stuff? Get PPA Express free!

Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.

Mark Warren
Mark Warren
17
September 2020

A bad week for universities targeted in cyberattacks

There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?

Andy Harris
Andy Harris
3
September 2020

Adaptive Authorisation vs Adaptive Authentication

Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation

Mark Warren
Mark Warren
4
June 2020

Imagine If It Was Easy To Provision New Accounts

Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer

Mark Warren
Mark Warren
26
May 2020

Imagine If Business Users Could Get Their Own AWS Data

Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...

Mark Warren
Mark Warren
13
May 2020

Imagine If Recertification Was Easy

Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA

Andy Harris
Andy Harris
27
April 2020

PIM, PUM and PAM explained

Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:

Mark Warren
Mark Warren
7
April 2020

Introducing Osirium PAM v7.0

There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...

David Guyatt
David Guyatt
19
March 2020

Secure Remote Privileged Access for Free

Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.

Mark Warren
Mark Warren
1
October 2019

What is Privileged Process Automation

If you had the choice, what superpower would you have?

Andy Harris
Andy Harris
17
September 2019

PAM - Fault-Tolerant and Highly-Available

We’re often asked about high availability and fault tolerance for Osirium PAM

Mark Warren
Mark Warren
10
September 2019

Introducing PXM Platform 6.5 – What’s New?

PXM Platform reaches v6.5, see what's new

Andy Harris
Andy Harris
28
August 2019

Controlling AWS Costs with PPA

Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.

Mairi Chisholm
Mairi Chisholm
9
August 2019

Announcing PPA 2.2

We’re very pleased to announce that the latest release, 2.2, is now available

Andy Harris
Andy Harris
9
August 2019

Auditing Privileged Access Management

Where would the investor confidence be without the governance...

Andy Harris
Andy Harris
8
August 2019

Five Reasons Why You'll Sleep Better with Osirium's PAM

If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …

Andy Harris
Andy Harris
30
July 2019

Multi-Factor Authentication: Osirium PAM and OneLogin

Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out

Andy Harris
Andy Harris
12
June 2019

Why you need PAM for Process Automation

In this post, we're going to look at some aspects of automating a privileged process

Mark Warren
Mark Warren
6
June 2019

Infosec 2019 – Bigger than ever for Osirium

In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days

Andy Harris
Andy Harris
24
May 2019

Securing Third Party Access

There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks

Mark Warren
Mark Warren
30
April 2019

Secure IT Process Automation – Dream or Reality?

Is it possible to automate IT tasks, improve security and improve customer service?

Mark Warren
Mark Warren
5
April 2019

Privileged Access Management and Essential Services

To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.

Mark Warren
Mark Warren
18
March 2019

Thoughts on Cloud and Cyber Security Expo 2019

Reflections on Cloud and Cyber Security Expo 2019

Andy Harris
Andy Harris
14
February 2019

The journey through PAM, PTM and onto RPA

Secure automation needs more than just robots, you need privileged process automation.

Andy Harris
Andy Harris
11
February 2019

What is Privileged Robotic Process Automation?

Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)

Andy Harris
Andy Harris
8
February 2019

Privileged Access Management – Common Use Cases

PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use

Andy Harris
Andy Harris
10
January 2019

Why NHS security needs a new approach to PAM

Osirium’s PAM is specially designed to stop cyber-attackers from hacking NHS operations

Andy Harris
Andy Harris
28
November 2018

Sharing Privileged Accounts With Third Parties

In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.

Andy Harris
Andy Harris
27
September 2018

What are the different approaches to digital transformation

We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations

Andy Harris
Andy Harris
21
September 2018

Osirium and RazorSecure Strategic Alliance

Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.

Andy Harris
Andy Harris
9
August 2018

How to separate your business from cyber-attacks

The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.

Andy Harris
Andy Harris
4
June 2018

Why PAM should be on every Operations Managers’ wish list

Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.

Andy Harris
Andy Harris
13
May 2018

PAM Express Introductory Video Series

A new set of tutorial videos to get you up and running fast with Osirium PAM Express

Osirium
Osirium
30
April 2018

The education sector must be educated on cyber-security

Across all industries, cyber-attacks continue to grow in number and severity. The education sector is becoming particularly targeted.

Osirium
Osirium
6
April 2018

Why you shouldn’t be complacent about cloud security

More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.

Andy Harris
Andy Harris
4
April 2018

Robotic Process Automation (RPA) and Task Automation

Robotic Process Automation (RPA) within our solutions for more than eight years in our Privileged Task Management module.

Osirium
Osirium
27
March 2018

Analysts recognise Osirium’s Task Automation innovation

Task automation has played an integral part in the Osirium PAM since its very inception in 2008.

Osirium
Osirium
27
March 2018

IT security, efficiency, and the robots making it happen

In the IT security world, with the last 12 months showing us terrifying data breaches, robots might just be the key to our salvation

Andy Harris
Andy Harris
15
March 2018

Implementing the Dual Account model with Osirium PAM

The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.

Andy Harris
Andy Harris
26
February 2018

Meeting significant GDPR needs using Osirium’s PAM

Here’s the problem for Osirium; Every cyber security company out there is suggesting that they address GDPR requirements.

Andy Harris
Andy Harris
26
February 2018

Benefits for the Board when you choose Osirium’s PAM

Osirium's PAM provides many business benefits that will keep the Board happy.

Andy Harris
Andy Harris
22
February 2018

Responding to the unique needs of M(S)SP’s

Managed Security Service Providers face differing challenges to other industries we serve. With GDPR on the horizon, we discuss these unique needs.

Andy Harris
Andy Harris
21
February 2018

Building a coping mechanism for data breaches

Breaches may be daily news, but they will always be a significant worry for business stakeholders

Andy Harris
Andy Harris
21
February 2018

Cybersecurity – Making it everyone’s business is futile

Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security

Andy Harris
Andy Harris
8
February 2018

NHS Cybersecurity #2: People and Passwords

NHS seeks to improve, the outsourcing of IT contracts has increased, and data security controls that should protect staff and patients

Osirium
Osirium
3
February 2018

So Why Privileged Account Management (PAM)?

Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls

Andy Harris
Andy Harris
1
February 2018

Least Privileged Model with PAM

Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do

Osirium
Osirium
5
December 2017

When the boss won’t budget for PAM

What would a data breach cost your business? How to justify investment in PAM

Osirium
Osirium
29
May 2017

The rise and rise in cyber fraud (The ‘Insider Threat’)

Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes

Osirium
Osirium
18
May 2017

Cyber Essentials: why it is essential to your business

Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability

Osirium
Osirium
12
April 2017

Privileged Access Management delivers the safety net

In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…

Andy Harris
Andy Harris
7
April 2017

Notes from the Fraud Tube Spring Event

With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...

Osirium
Osirium
31
March 2017

Watching The Insider Threat: So Why Privileged Access?

The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence

Andy Harris
Andy Harris
28
March 2017

Privileged Task Management – Busy Work versus Thinking Work

In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about which they prefer doing

Andy Harris
Andy Harris
9
March 2017

Osirium PAM ServiceNow Integration

Taking Privileged Access Management (PAM) one step higher in security and compliance

Andy Harris
Andy Harris
28
October 2016

Creating resilience through security cells

Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them

Andy Harris
Andy Harris
22
September 2016

The Cost of Uncertainty

Today we’re hearing about the aftermath of an attack

Andy Harris
Andy Harris
6
September 2016

Two Ideas

We’ve heard a couple of deployment ideas recently

Andy Harris
Andy Harris
19
May 2016

Early versus late data breach outcomes

We spent some time looking at the outcomes for companies that were the victims of cyber breaches

Andy Harris
Andy Harris
20
April 2016

IAM Round Table Notes

Yesterday we attended a round table session about building effective Identity and Access Management solutions

Andy Harris
Andy Harris
12
November 2015

The JPMorgan Breach and the Problem with Passwords

Earlier this week US investigators charged three men after a multi-year cybercrime campaign

Andy Harris
Andy Harris
5
November 2015

The year of the weekly data breach

Data breaches have fast become the scourge of modern enterprise

Andy Harris
Andy Harris
23
October 2015

Separating people from passwords

Rigorous password policies are creating the exact opposite of their intended outcome

Andy Harris
Andy Harris
6
October 2015

Osirium as an Identity Federator

The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.

Topics

All
Audit, Compliance and Governance
Automation
DevOps
Education
Endpoint Privilege Management
GDPR
Healthcare
IT Process Automation
Identity & Access Management
Managed (Security) Service Provider
Manager
Privileged Access Management
Privileged Access Security
Privileged Process Automation
Ransomware
Technical
Third-Party Access

Authors

Andy Harris
Cameron Harris
Carlos Ruiz
David Guyatt
James Nadal
Mairi Chisholm
Mark Warren
Osirium
Tom Hills
Back to top

Want to know more?

If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.

+44 (0) 118 324 2444
Thank you! Your submission has been received and we'll be in touch
Oops! Something went wrong while submitting the form.
Home Page
cyber essentials certified badge
Industries
EducationFinanceGovernment and DefenceHealthcareIT OperationsIndustrial Control SystemsLegalRetail
Company
AboutTeamBoard of DirectorsInvestor HubJob Opportunities
Resources
Free ToolsBlogPAM IntegrationsVideosWebinarsWhitepapersDatasheetsDocumentationCase Studies
Support
Support PortalOsirium University
© 2023 OSIRIUM. All rights reserved.
AccessibilityPrivacy PolicyEULATerms of ServiceSitemap