Developers need local admin rights on their workstations, but that's risky. See how that risk can be removed by using Privileged Endpoint Management (PEM)
Ransomware covers many different types of attack, the latest being "Brickers" and "Wipers" find out more and how to defend against them in this blog.
Osirium products are not affected by the so-called "Dirty Pipe" vulnerability, here are the details.
Privileged Process Automation (PPA) can be transformative for IT Process Automation, find out how ....
Long-term vulnerability in Linux poses no risk for Osirium PAM
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
Managing VMs is a pain, but Privileged Process Automation can safely automate the common tasks. See how ...
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
A new type of automation is needed for DevOps
Security updates need to be done right first time and automation ensures safe and accurate changes. See how in this blog.
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
Developers need to install and configure Visual Studio and various add-ins to do their work. PEM lets them do their work without needing local admin rights
Getting the balance right between security and user productivity is really hard. With PEM, the balance can be restored so everyone's happy.
For many organisations, Slack has become the central core of communications between processes and people.
Osirium’s Privileged Process Automation (PPA) tool formerly known as Opus is the perfect complement to Ansible
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
Osirium PAM can use both passwords and SSH Keys for the role-based connections where the device supports keys.
DevOps is hard enough, don't let the risk of exposing credentials make it worse.
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Here’s the How-To video for using Osirium PAM with Elastic Stack.
At Osirium, we created our Management Application Proxy Server (MAP Server)
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences
Passwords are one of the biggest threats to enterprise data security around today
If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.