THE BLOG

gestion_accès_privilèges_bonnes pratiques

What are the best practices for a PAM solution and privileged access management?

The consensus is that a Privileged Access Management (PAM) solution has become essential to reduce risk and deal with the cyberattacks to which privileged access is increasingly exposed. However, certain difficulties remain once these solutions that aim to secure, control and manage an organization’s privileged accounts have been implemented. So, what is the best way to control the risks… 

Trendings Topics

ITGC IT General Controls

Control and Compliance

We live in a world where all users, whether employees, providers, sub-contractors, partners or customers, have become intense consumers of data and IT services. Additionally, with the …

/

10 Best Practices to Optimize Your User Access Reviews

User Access Review

For any organization, the user access review, otherwise known as access recertification, is an important practice. As a critical component of your Identity and Access Management…

/

Customers Make the Leap to Access Review Automation

User Access Review / Identity Analytics

Brainwave is happy to share this recent exchange with one of our key customers who sings the praises of moving from a…

access rights reviews, methodology and best practices

10 Best Practices to Optimize Your User Access Reviews

User Access Review

For any organization, the user access review, otherwise known as access recertification, is an important practice.

“One of the best in market”

“Good results with a very friendly user experience”

“A product adapted to our needs”

Identity Analytics is at the Heart of a Cybersecurity Strategy

Identity Analytics / Cybersecurity

We live in a world where all users, whether employees, providers, sub-contractors, partners or customers, have become intense consumers of data and IT services. Additionally, with the …

How to protect your passwords from hackers?

Cybersecurity

The current health crisis is greatly accelerating telecommuting for employees with a job that allows it. We have seen in the news that there has been an increase in computer attacks which take…

Why you should review Privileged Accounts even if you are already using PAM solutions

Identity Analytics  / Privileged Access

These accounts are extremely critical because they allow you to manage and modify access to company assets and to take partial or total…

Identity Analytics is at the Heart of a Cybersecurity Strategy

Identity Analytics / Cybersecurity

We live in a world where all users, whether employees, providers, sub-contractors, partners or customers, have become intense consumers of data and IT services. Additionally, with the …

How to protect your passwords from hackers?

Cybersecurity

The current health crisis is greatly accelerating telecommuting for employees with a job that allows it. We have seen in the news that there has been an increase in computer attacks which take…

Why you should review Privileged Accounts even if you are already using PAM solutions

Identity Analytics  / Privileged Access

These accounts are extremely critical because they allow you to manage and modify access to company assets and to take partial or total…

Review of Infrastructure Access

User Access Review

Infrastructure access is not always well understood, controlled or reviewed. IAM/IGA projects generally focus on application rights while neglecting infrastructure access. As a result, it is common to find that accounts and the rights assigned to…

Access certification campaigns that work

User Access Review

The current health crisis is greatly accelerating telecommuting for employees with a job that allows it. We have seen in the news that there has been an increase in computer attacks which take…

Can An IGA Project Be Done Without Identity Analytics ?

Control and Compliance / Identity Analytics

Almost two years ago, Gartner made an observation about Identity Governance and Administration (IGA) projects, saying that the deployment of more…

Periodic or Continuous Review of Access Rights

Periodic or Continuous Review of Access Rights Part 2

User Access Review

In a previous article on access rights review, we highlighted the differences between periodic and continuous access reviews and how to use each one. The conclusion was that the two approaches serve different purposes and should be seen as complementary. They do not replace each other.  When used together, they are the most successful form of access review available…

More Resources

Webinars Replays

Replays-webinars

Videos

vidéos

Downloads

contenus à télécharger