Osirium PAM
Osirium AUTOMATION
Osirium PEM
PAM Express
AD Audit Tool
PPA Express
PEM Audit Tool
If you've got any questions, please complete the form, and we'll be in touch. Prefer to talk to an expert? Give us a call on
Osirium products are not affected by the so-called "Dirty Pipe" vulnerability, here are the details.
Privileged Process Automation (PPA) can be transformative for IT Process Automation, find out how ....
Long-term vulnerability in Linux poses no risk for Osirium PAM
The latest release of Osirium PAM bring scheduled JIT, MFA and much more.
A critical vulnerability has been found in Log4J - Osirium products are not affected, find out why ...
Passwords are not a great way to protect systems used by human beings. With Authlogics, PAM access can be secure without passwords. Learn more ...
Managing VMs is a pain, but Privileged Process Automation can safely automate the common tasks. See how ...
Managing patches to an estate of Windows is a major effort. Privileged Process Automation (PPA) can accelerate and simplify the whole process, see how ...
A new type of automation is needed for DevOps
Security updates need to be done right first time and automation ensures safe and accurate changes. See how in this blog.
NetOps is a critical activity that needs security and accuracy. Privileged Process Automation (PPA) makes NetOps automation easy, here's an example
PPA v2.5 is a major update and now anyone can build their own workflow automations in a low-code environment.
Developers need to install and configure Visual Studio and various add-ins to do their work. PEM lets them do their work without needing local admin rights
Getting the balance right between security and user productivity is really hard. With PEM, the balance can be restored so everyone's happy.
For many organisations, Slack has become the central core of communications between processes and people.
Osirium’s Privileged Process Automation (PPA) tool formerly known as Opus is the perfect complement to Ansible
One of the distinct advantages of Osirium PAM is its ability to deliver Privileged Access Management (PAM) to a very wide range of systems
Accelerating the software delivery pipeline while improving the overall security posture. Sounds like a tall order but it is possible with PAM
First off, the first main issue is the word 'Things', it is too general. Things break down into different categories
Since Osirium PAM is an 'Identity In - Role Out' product, the quality of identity proof is crucial in highly secure environments.
Osirium's PxM Platform can use both passwords and SSH Keys for the role-based connections where the device supports keys.
DevOps is hard enough, don't let the risk of exposing credentials make it worse.
Like most sales managers, our internal sales manager needed access to the Call Record Database of our AsteriskNOW implementation.
Here’s the How-To video for using Osirium's PxM Platform with Elastic Stack.
At Osirium, we created our Management Application Proxy Server (MAP Server)
Ed’s presentation covered how we identify the good from the bad. In particular how the choice of good boundaries for Functions and API’s
The difference between what the Osirium PxM Platform is purchased for, and what our longstanding customers actually do with our products
For example, your organisation thinks it is a good idea to blacklist the ‘rm’ command. Let’s consider the difference between these command sequences
Passwords are one of the biggest threats to enterprise data security around today
IT leaders must consider their department as a major target for advanced attackers and take appropriate steps to mitigate that risk
Here’s a quick security fix on how to reduce risk for your team’s shared accounts in just 15 minutes.
If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.