Comment lutter contre le shadow admin ?

How to Fight Against Shadow Admin?

When it comes to privileged accounts, traceability is essential, but it is sometimes compromised by the use of shadow admin. This traceability, as well as real-time or a posteriori control of the administration actions allowed by the PAM (Privileged Access Management) should however be exhaustive to effectively protect the information system…. Read More >>

PAM-as-a-Service

PAM as a Service: Privileged Access Management for everyone?

The protection of information systems requires the deployment of a PAM (Privileged Access Management) solution for the surveillance of privileged users, which if deployed on-premise, may be too restrictive to implement for some organizations. In this context, PAM as a Service, or Privileged Access Management as a public cloud service, will be a guarantee of simplicity for the IT teams involved. From a deployment in a few clicks to the guarantee of regular and automatic updates, PAM as a Service… Read More >>

Réseau d’administration

Administration network: 6 risks addressed by PAM

Within any organization, there are several risks for the administration network: some have a high occurrence and are simple to deal with, others are rare but complex to handle. The use of a Privileged Access Management (PAM) solution allows to manage these risks by minimizing or even eliminating them. Administration network: protean risks The risks that arise on the administration network can be the result of deliberate acts but also due to errors or negligence. From the use of generic… Read More >>

User Behavior Analytics (UBA)

User Behavior Analytics (UBA): key applications for cybersecurity

While User Behavior Analytics (UBA) is not a new concept, its applications are multiplying as Machine Learning becomes more mature. By associating Machine Learning and Big Data, UBA updates the patterns (reference models) and detects any deviation that is potentially dangerous for the information system. What is User Behavior Analytics? User Behavior Analytics is a category of applications that analyzes the user’s behavior and detects abnormal and potentially malicious actions. This behavioral analysis, which can be applied to all users,… Read More >>

terminal client léger

Making the administration workstation incorruptible with a hardened thin client terminal

The terminal allowing administrators to access the administration network is a key element for the global security of organizations’ information systems. A possible corruption of this terminal is a major risk for companies. The use of a hardened thin client terminal communicating with administration virtual desktops allows you to take advantage of the specific and secure architecture of a hardened thin client terminal while benefiting from the functionalities of Privileged Access Management (PAM) solutions thanks to virtualization. Prerequisites for using… Read More >>

moindre privilège

Least privilege: a key principle for the security of the Information System

The least privilege principle consists in limiting the rights/authorizations of any individual on the information system to only those applications/data that are necessary for his missions. This principle appears in many guides relating to cybersecurity, in particular in documents published by the National Cybersecurity Agency of France – ANSSI (PA-022 – recommendations relating to the secure administration of information systems or PG-040 – recommendations for the implementation of system partitioning) or in the rules issued by the French MPL (Military… Read More >>

vpn

VPN vs ZTNA

Since the democratization of Internet at the end of the 1990s, the VPN (Virtual Private Network) has been used by companies to provide their employees with private and secure remote access to their information systems. Nowadays deployed in many organizations, the VPN still presents some risks to the integrity of information systems. To overcome this issue, ZTNA (Zero Trust Network Access) solutions, which are much more secure, are gradually replacing the VPN within organizations. VPN: connecting two networks of trust… Read More >>

gestion des accès à privilèges - PAM

What exactly is Privileged Access Management?

If you work in the IT industry, you’ve probably already heard terms like “Privileged Access Management” (PAM) and “Privileged User Management”. But you didn’t say anything because you didn’t know exactly what it was all about. Don’t worry, in this blog post you’ll learn everything you need to know about Privileged Access Management. PAM according to the Gartner According to the Gartner, “Privileged Access Management” (PAM) solutions are designed to help organizations provide a secure and privileged access to critical… Read More >>

Authentification continue

Continuous Authentication : When Behavioral Analysis Guarantees Your Identity

Many authentication methods exist nowadays. The most well-known of them is by using the login/password pair. For a better secured access to the information system, many organizations have implemented a multi-factor authentication (MFA), especially for IS administrators. But once authenticated, what guarantees that it is the same person behind the screen, mouse or keyboard? Continuous authentication : what is it ? Continuous authentication is a permanent authentication based on the user’s behavior on the workstation. Via the Machine Learning, a… Read More >>

Cybersecurity: a cost that generates savings

Cybersecurity: a cost that generates savings

For organizations, the deployment of cybersecurity solutions represents a significant and yet essential cost. The challenge is to avoid cyber attacks (internal or external to the organization) and therefore their financial consequences (among others). However, this cost must be seen in the context of potential savings that can be realized when a cyber attack fails thanks to the cyber security solutions deployed by the target organization. In their ninth annual study “The cost of Cybercrime” [01], Accenture Security and the… Read More >>