Privileged User Manager

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

michaelfangelo
Jan 8, 2015
9:33 am
Reads:
979
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
389
Score:
Unrated

As I listen to IT folks express their concerns about the risk posed by today’s tablets and smart phones, it seems to me that some of them  are in denial about how secure their environments were before them. In the early years of the digital age, once users moved from terminals to distributed desktops, IT’s…

+ read more

Kent Purdy
Jun 25, 2014
5:06 pm
Reads:
883
Score:
Unrated

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
1,055
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,471
Score:
5

The main objective of this article is to give a step by step procedure to configure the command control access for the network devices like router and switch using NPUM.

ashishmrt
By: ashishmrt
Jan 14, 2014
8:37 am
Reads:
1,473
Score:
1

The main objective of this article is to give a step by step procedure for customers to help them to configure the policies for disabled LDAP user to execute usrun command using NPUM.

ashishmrt
By: ashishmrt
Jan 7, 2014
2:54 pm
Reads:
1,057
Score:
Unrated