FOLLOW US  facebook twitter linkedin viadeo

Wallix

Home / Download / White papers

KUPPINGERCOLE REPORT: HOW TO REDUCE YOUR RISK FROM AN INSIDER ATTACK 
THROUGH PRIVILEGED USERS MANAGEMENT

KuppingerCole Report WAB2015


How to reduce your risk from an insider attack
through Privileged Users Management

Founded in 2004, KuppingerCole is a global Analyst Company headquartered in Europe focusing on Information Security and Identity Access Management.

This report produced by KuppingerCole highlights the key requirements for managing and monitoring privileged users in your business. Individuals with elevated access pose one of the biggest threats of a data breach, yet many organisations don’t have measures in place to control, manage and monitor their access.

Download the full report by analyst Mathias Reinwarth for a practical and pragmatic explanation of the importance of dealing with privileged users as well as an assessment of the capabilities of Wallix AdminBastion:

   check Managing and controlling access
   check Approval workflows
   check Session recording and full audit trail

kuppingerbutton

 

Or call us at: +44 203 440 5695

 

MARKET STUDY : MANAGEMENT OF PRIVILEGED ACCOUNTS

MS PUM  


Over 40% of Information Systems Security Managers (ISSMs) interviewed do not know if their company has been victim of an attack involving data leaks. This was revealed in a study performed by WALLIX on September 1, 2014, among a sample of 2,000 French information system security managers, 5% of which accepted to state their opinions.

«Market Study : Management of privileged accounts»

Download this document

Or call us at: +44 203 440 5695

 

IMPACTS OF REGULATORY CHANGES UPON I.S. GOVERNANCE

mazarsLBEN  

  In the first section of this document, we will summarise the main financial incidents that led the governments to set up regulations governing corporate internal control activities. These various regulatory frameworks include the new regulations governing information system management. Secondly, we will provide details of the main regulations applicable both to corporate processes involving information systems, and to corporate internal controls.

«IMPACTS OF REGULATORY CHANGES UPON INFORMATION
SYSTEM GOVERNANCE. Ensuring optimum compliance with existing and future regulatory standards »

Register here to download this White Paper

Or call us at: +44 203 440 5695

 

IT Service Providers Management

WPServiceprovidersThumb 

Managing your IT service providers

Simple solutions to solve your issues of external iT service providers and employees mobility management.
This white paper shows the basis for real security policies control and traceability of actions performed on the IS. It reflects the risk inherent in outsourcing and IT staff mobility. It provides simple answers, practical and efficient to implement this security policy.

Register here to download this White Paper

Or call us at: +44 203 440 5695

 

 

PCI DSS Compliance

TechnicalPaperPCIDSSTechnical paper Keys to compliances

The goal of this document is to reference the points on which the Wallix AdminBastion (WAB) provides answers to
the requirements of the PCI DSS security standard.
 
Register here to download this document :

Or call us at: +44 203 440 5695

 

 

Subscribe newsletter

How many eyes has a human ?
Name:
Email: