Can Developers be productive without Local Admin?
Developers need local admin rights on their workstations, but that's risky. See how that risk can be removed by using Privileged Endpoint Management (PEM)
Ransomware Payload Types Including Brickers and Wipers
Ransomware covers many different types of attack, the latest being "Brickers" and "Wipers" find out more and how to defend against them in this blog.
Dirty Pipe Vulnerability (CVE-2022-0847)
Osirium products are not affected by the so-called "Dirty Pipe" vulnerability, here are the details.
How Does Privileged Process Automation (PPA) Work?
Privileged Process Automation (PPA) can be transformative for IT Process Automation, find out how ....
Linux PolicyKit vulnerability no risk for Osirium PAM
Long-term vulnerability in Linux poses no risk for Osirium PAM
Launch of Osirium's PAM v8.0 - MFA, JIT, and lots more
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
Apache Log4j Vulnerability
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
Passwordless Authentication for PAM with Authlogics
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
Relieving the headaches of working with virtual machines
Managing VMs is a pain, but Privileged Process Automation can safely automate the common tasks. See how ...
How to know which Domain Controllers need updates
Zerologon vulnerability needs an urgent patch but how do you know which systems haven't been updated? PPA can help
Patch Tuesday Made Easy - With Privileged Process Automation
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
Imagine If DevOps Could Be Easily Automated
A new type of automation is needed for DevOps
Imagine If Security Operations Automation Was Easy
Security updates need to be done right first time and automation ensures safe and accurate changes. See how in this blog.
Imagine If ... Network Operations Automation Was Easy
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
Introducing PPA Task Builder - Low-code automation
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
Managing Developer's Systems with PEM
Developers need to install and configure Visual Studio and various add-ins to do their work. PEM lets them do their work without needing local admin rights
Privileged Endpoint Management – Security vs Users
Getting the balance right between security and user productivity is really hard. With PEM, the balance can be restored so everyone's happy.
Instant Internal Auditing with PAM, SIEM and Slack
For many organisations, Slack has become the central core of communications between processes and people.
Automating Ansible with Osirium PPA
Osirium’s Privileged Process Automation (PPA) tool formerly known as Opus is the perfect complement to Ansible
Privileged Access to Web Apps – A Magical Solution
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
PAM – The secret to CI and DevOps Success explained
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
IoT, Internet of Things is not a good term…
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
Multi-factor Authentication in Osirium PAM 6.1.0
Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
Using SSH Keys for Authentication in PAM
Osirium PAM can use both passwords and SSH Keys for the role-based connections where the device supports keys.
DevOps guide to Privileged Account & Credential Security
DevOps is hard enough, don't let the risk of exposing credentials make it worse.
Database Task Automation for Asterisk (AsteriskNOW)
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Using Elastic Stack with PAM
Here’s the How-To video for using Osirium PAM with Elastic Stack.
MAP Server – Protecting legacy applications
At Osirium, we created our Management Application Proxy Server (MAP Server)
When your biggest problems solved, you look to the next one
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
So What’s Wrong with Blacklisting Commands?
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences