Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
PARIS, April 21, 2022
PARIS, April 21, 2022 /PRNewswire/ -- To meet the new challenges of the digital world, WALLIX (Euronext: ALLIX), a European publisher of cybersecurity software and expert in access and identity security, has developed a vision, "PAM for all", enabling it to offer its customers the promise of a secure digital transformation for all. To realize this vision, WALLIX now offers WALLIX PAM4ALL, a unified solution that brings together all WALLIX technologies and goes beyond the protection of privileged accounts by securing, according to the principle of least privilege, all at-risk users and workstations in an organization.
The new challenges of digital technology
The need to secure access to data has never been greater. With the pandemic, our world is experiencing an acceleration of its digital transformation (standardization of teleworking, massification of cloud services, strong growth in the number of mobile terminals...). These new uses, which allowed organizations to continue to operate during these long months of lockdown, considerably multiply the number of access points to organizations' IT infrastructure. There are so many new potential entry points for hackers that they must be secured urgently to protect data. Moreover, the results of 2021 are clear: 40 billion pieces of personal data have been hacked, an increase of 78% compared to 2020[1].
This figure will grow as cybercrime becomes more industrialized, thus considerably increasing the cyber risk to our economy. Today, hacker organizations operate like companies, which is why cybercrime is currently considered the third largest economy in the world. Its global cost is estimated to be $6 trillion by 2021 and $10.5 trillion by 2025, up from $3 trillion in 2015[2] This cost includes damage and destruction of personal and/or financial data, loss of productivity, embezzlement, fraud, theft of money, but also of intellectual property and damage to reputation. There are also the costs incurred by the disruption of the organization's activity, sometimes for a long period of time after the attack, and finally the investments required to restore the hacked data and systems.
We are living in a paradigm shift where perimeter security no longer exists, where users - whether humans or machines - are increasingly mobile and need to access organizations' data, at any time, from anywhere. Data itself is becoming volatile (cloud storage, SaaS solutions, automation...) to control costs and gain agility. This affects all sectors, especially the most critical ones such as healthcare, industry, insurance, or public services, which urgently need to secure all these access, to ensure business continuity, while respecting regulatory requirements in terms of risk management and data protection. Data must remain accessible to all in order to continue to innovate and thus ensure economic competitiveness.
The answer: WALLIX PAM4ALL
In the current context, it is essential for organizations to secure their IT access and not only the most sensitive accounts (privileged accounts). WALLIX PAM4ALL is a unified solution combining all WALLIX technologies, which goes beyond securing privileged accounts, and protects, according to the principle of least privilege, user access and workstations, to avoid contamination by malware or ransomware. At some point in their daily functions, all users need privileges to access certain digital resources in the organization. The challenge is to provide access at the right time, at the right privilege level, to perform the expected task, regardless of where the user is located, whether inside or outside the company.
WALLIX PAM4ALL provides access control and visibility over:
To do this, WALLIX PAM4ALL combines WALLIX technologies in one single solution:
"WALLIX PAM4ALL is the promise of a secure digital transformation for all organizations, in a rapidly changing digital context. With PAM4ALL, our customers have the means to quickly implement a Zero-Trust architecture thanks to strong user authentication, access control adapted to each user (human or machine), at the right time (Just-In-Time), and to integrate traceability in the IT infrastructure. It is also the possibility to have a dynamic view of the activity on your network and to protect yourself from advanced threats, particularly malware. " explains Edwige Brossard, Product & Marketing Director at WALLIX.
ABOUT WALLIX
A software company providing cybersecurity solutions, WALLIX is the European specialist in Identity and Access Security Solutions. WALLIX PAM4ALL, the unified privilege management solution, enables companies to respond to today's data protection challenges. It guarantees detection of and resilience to cyberattacks, which enables business continuity. The solution also ensures compliance with regulatory requirements regarding access to IT infrastructures and critical data. WALLIX PAM4ALL is distributed through a network of more than 300 resellers and integrators worldwide. Listed on the Euronext (ALLIX), WALLIX supports more than 1900 organizations in securing their digital transformation. WALLIX affirms its digital responsibility and is committed to contributing to the construction of a trusted European digital space, guaranteeing the security and confidentiality of data for organizations as well as for individuals concerned about the protection of their digital identity and privacy.
www.wallix.com | info@wallix.com
[1] Research conducted by Tenable, WALLIX's technology partner: https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective
[2] Research carried out by Cybersecurity Venture: : https://cybersecurityventures.com/wp-content/uploads/2021/01/Cyberwarfare-2021-Report.pdf
Logo - https://mma.prnewswire.com/media/1801456/Wallix_Logo.jpg
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs