EPM is a critical cyber security defence, but how can you ensure it gets used and provides the expected protection?
What is endpoint privilege management and how important is it?
Allowing employees to have local admin rights is fraught with dangers for all firms. But Osirium PEM, now with 100% native Azure AD support, offers a solution.
Exploring the subject of rising threats from cyber criminals and ransomware attacks.
Is education a prime target for ransomware attackers in 2023?
The ransomware attack at MediBank has many of the classic elements of a ransomware attack. How could they be avoided?
Automation is the key to better cybersecurity and better IT service. Find out how in this blog.
PAM is evolving and your current ideas about PAM need to be reviewed to make sure you're set up for a secure IT future
Most IT Help Desks would love to let users do more for themselves - as long as it was safe. Read how it's possible with this case study from a GP practice.
When choosing a solution to secure endpoints, don't be distracted by unnecessary features - find out how in this blog
There isn't "one size fits all" solution for IT Process Automation, so how do you make a choice? Find out in this blog
Recent reports show the state of cybersecurity in the UK, but the numbers are confusing. What lessons can be learnt? Find out in this blog.
How PAM addresses the needs of the joint ENISA & CERT-EU recommendations for cyber resiliency
Removing the risk of local admin without impacting AutoCAD users
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
MSPs are a valuable target for ransomware attacks, new research shows what MSPs should be doing to protect their clients
New research shows most UK Businesses are vulnerable to ransomware attack, find out the biggest gap in their protection ...
The latest Ponemon report shows the increased cost of a breach, and the effect of remote working and ransomware. Get behind the headlines.
Zero Trust architecture is the best way to protect against infection by ransomware or malware, but needs careful planning. Learn more in this blog.
A summary of the recent CyberUK 2021 conference, including protecting the NHS and education sector from ransomware.
Many organizations depend on MSPs and MSSPs. This article discusses why MSP security is critical to protect themselves and their clients.
Understanding the threat and blocking lateral movement from ransomware
Remote access to IT systems for staff and third-parties needs to be approached carefully - see why Privileged Access Management (PAM) is key to working safely
Osirium PAM now includes Automation to extend protection and optimize IT operations. Find out more.
At Osirium, we believe that Privileged Access Security is a combination of three fundamental functions that use three foundation technologies
Both IAM and PAM are critical areas of cyber security delivering protection to different audiences, but what are the differences are they both needed?
Backups are absolutely so need careful protection. That's why you must use PAM to access backup management systems like PAM. Find out more ...
Whatever your goals for 2021 might be, Privileged Access Management (PAM) should be high on the list. Find out why.
There are reports of cyber attacks on AstraZeneca by North Korea. A couple of key capabilities are critical to protecting against such attacks. Learn more ...
For the NHS, the Digital Security and Protection assessment is a mandatory requirement. How can you make compliance and auditing easy? Find out more.
The combination of Osirum Privileged Access Management (PAM) with RSA Identity Provider makes a powerful and flexible cloud-based privilege access solution.
Cyber Essentials is a critical requirement for every organisation but can be daunting. Read more to see how Privileged Access Management (PAM) is the key.
The NCSC Annual Report highlights the changing threat landscape and calls out importance of PAM
IAM and PAM may seem like duplication or in competition but in reality, they're both needed for a single pane of glass security posture. Find out why.
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Too many IT and business operations are repetitive but have been hard to automate. Now the free PPA Express makes it possible.
There have been attacks at two universities in the UK and Department of Veterans Affairs in the US. Could Privileged Access Management (PAM) have helped?
Automation is great but it has to be smart to decide when changes are safe and when more review and approval is needed. See how PPA does Adaptive Authorisation
Provisioning accounts for new starters can be a slow and frustrating business but automation can be the answer
Responding to requests for systems data, like AWS or Azure bills, is time-consuming for IT. PPA makes it safe to delegate the access to business users ...
Regular recertification of privilged accounts is a critical compliance process but highly manual and error-prone. See how it can be automatically with PPA
Here’s a quick rundown of all these terms, what they do, and which bits of the Platform performs them:
There's a major update to Osirium PAM available that includes a new web client and high-availability clustered servers. Find out more ...
Remote privileged access to vital IT systems is critical. Osirium offers modern PAM for free. Find out more.
If you had the choice, what superpower would you have?
We’re often asked about high availability and fault tolerance for Osirium PAM
PXM Platform reaches v6.5, see what's new
Controlling AWS costs usually needs an Admin account and specialist knowledge. With PPA, anyone with the right role can do it.
We’re very pleased to announce that the latest release, 2.2, is now available
Where would the investor confidence be without the governance...
If you’re an IT manager or strategist, you want to spend your time developing systems and solutions that propel your business forward, in an ideal world …
Osirium PAM provides Privileged Access Management (PAM) using the principle of identity-in / role-out
In this post, we're going to look at some aspects of automating a privileged process
In the calm before the storm of the last day of the Infosecurity 2019 show, it seems like a good opportunity to gather some thoughts about the last few days
There’s a lot of good that can be achieved when working closely with third parties, but there are also a lot of risks
Is it possible to automate IT tasks, improve security and improve customer service?
To find out how to increase protection for essential services, Osirium and RazorSecure have a webinar coming up to discuss exactly how that can be done.
Reflections on Cloud and Cyber Security Expo 2019
Secure automation needs more than just robots, you need privileged process automation.
Here, we are going to outline the differences between Robotic Process Automation (RPA) and the Privileged version (PRPA)
PAM (Privileged Access Management) solutions are built to control access to Privileged Accounts to drive security. Here, we will outline some of the common use
Osirium’s PAM is specially designed to stop cyber-attackers from hacking NHS operations
In this article, we'll look at customer, MSP and contractor sides of this issue. Outsourcing work to a third-party is a frequent occurrence.
We're always intrigued by the wide range of descriptions of ‘digital transformation’ here are a few considerations
Strategic alliance means sharing ideas, code and pre-production demostrations along with modifications to our main products.
The cybersecurity landscape is ever changing. New threats appear daily, and the techniques used by attackers continuously evolve.
Operations Managers are at the centre of IT production, running the systems, applications and infrastructure that are the lifeblood of the organisation.
A new set of tutorial videos to get you up and running fast with Osirium PAM Express
Across all industries, cyber-attacks continue to grow in number and severity. The education sector is becoming particularly targeted.
More companies than ever are dedicating a larger percentage of their IT budgets to cloud computing, and it’s not hard to see why.
Robotic Process Automation (RPA) within our solutions for more than eight years in our Privileged Task Management module.
Task automation has played an integral part in the Osirium PAM since its very inception in 2008.
In the IT security world, with the last 12 months showing us terrifying data breaches, robots might just be the key to our salvation
The Dual Account model has long been best practice amongst SysAdmins and DevOps. This blog explores what the model entails.
Here’s the problem for Osirium; Every cyber security company out there is suggesting that they address GDPR requirements.
Osirium's PAM provides many business benefits that will keep the Board happy.
Managed Security Service Providers face differing challenges to other industries we serve. With GDPR on the horizon, we discuss these unique needs.
Breaches may be daily news, but they will always be a significant worry for business stakeholders
Let’s discuss the value of the cloud and outsourcing, not regarding cost, but security
NHS seeks to improve, the outsourcing of IT contracts has increased, and data security controls that should protect staff and patients
Privileged accounts, every business has them. They need greater access to the infrastructure and fewer limiting controls
Least Privileged Model – It’s accepted knowledge that a least privileged model are good for security. They limit what a person, system or code base can do
What would a data breach cost your business? How to justify investment in PAM
Current or ex-staff members engaging in theft of some kind, or misusing company credit cards and expense accounts, was in the top 10 most reported crimes
Cyberspace is changing the way we conduct business; it’s brought incredible benefits but also terrifying vulnerability
In these our uncertain times, Privileged Access Management (PAM) delivers the safety net that might just save us all…
With a new format covering the best part of the day and into the night, there was an eclectic mix of presentations prompting us to really think about...
The Internet was conceived without security at its heart, and crime has changed drastically as a result of its existence
In the world of DevOps there are two types of work, ‘busy work’ and ‘thinking work’. Your staff will be very clear about which they prefer doing
Taking Privileged Access Management (PAM) one step higher in security and compliance
Osirium believe that the following issues are the main contributors and share with you how our PxM Platform combats them
Today we’re hearing about the aftermath of an attack
We’ve heard a couple of deployment ideas recently
We spent some time looking at the outcomes for companies that were the victims of cyber breaches
Yesterday we attended a round table session about building effective Identity and Access Management solutions
Earlier this week US investigators charged three men after a multi-year cybercrime campaign
Data breaches have fast become the scourge of modern enterprise
Rigorous password policies are creating the exact opposite of their intended outcome
The identity market has been getting stronger, it needs to get stronger as more and more business functions migrate to the cloud.
If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.