by Varsha K | Jan 14, 2021 | Backups, Cyber security, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation
Backups need protection Backups are a good thing. Obviously! But they’re important for much more than restoring a file deleted accidentally. When ransomware attacks, it sets out to cause as much disruption as possible. Often, the only escape (other than paying...
by Varsha K | Dec 28, 2020 | Cyber security, Data Security, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation
Common DevOps Challenges A common activity for many developers is to quickly spin-up or refresh their dev or test environments as they’re developing new features on investigating production issues. If you’re someone that’s familiar with tools like...
by Varsha K | Nov 17, 2020 | Cyber security, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation
Every day … If you’re a developer, you’re probably working with multiple virtual machines (VMs) every day. How often do you have to start, stop, restart a VM? Or take a snapshot or restore a previous snapshot? In a worse case scenario, you may even...
by Varsha K | Nov 11, 2020 | Cyber security, Privilege Management, Privileged Access Management, Privileged Endpoint Management, Privileged Identity Management, Privileged Process Automation, Privileged Remote Access
What’s the difference between Adaptive Authorisation and Adaptive Authentication? And does it matter? Definition: Adaptive: serving or able to adapt; showing or contributing to adaptation. In essence Adaptive Authentication is a process applied by an...
by Dutta | Sep 23, 2020 | Cyber security, Privilege Management, Privileged Access Management, Privileged Access Security, Privileged Endpoint Management, Privileged Process Automation
Patching – The continuing challenge for SysAdmins According to Wikipedia ‘Patch Tuesday’ started as an unofficial term to describe Microsoft’s regular updates generally landing on a Tuesday. It was formalised in October 2003 with updates...
by Dutta | Sep 8, 2020 | Cyber security, PPA, Privileged Process Automation, Security Automation, Security Operation Automation
How much more could you do if everyday tasks could be automated? Security operations are a critical defence mechanism for every business. Often, the Security Operations Center (or SOC) is thought of as the emergency service that gets called after a breach. Obviously,...