Ekran System Blog

News, opinions, and industry insights

July 08, 2019

In enterprises, there are different ways you can manage access to your critical data. The two most common approaches are privileged access management (PAM) and privileged user management (PUM). But what is the difference between them?

 

In this article, we compare PUM vs PAM. In 2019, it’s still challenging to draw the line between these approaches. We also take a look at which of the two is best for ensuring your company’s cybersecurity.

 

The problem of uncontrolled privileges

 

The less control you have, the more money...

Category:
June 27, 2019

Data breaches have become as real as being robbed on the street. The main difference here is losing customer data will lead not only to monetary losses but also to the loss of clients and reputation.

 

The first step to a solid cybersecurity system is conducting research on possible threats you face. A list of the threats mainly depends on your industry and the types of data you store.

 

Financial, health, and government information are the most likely to be stolen. This determines which industries are most vulnerable to data breaches. There’...

Category:
May 30, 2019

Protecting a company’s network against data leaks is the first priority of any security officer. However, this task is becoming more complex because of strong competition and the popularity of Bring Your Own Device policies. Though there are a wide variety of cybersecurity solutions on the market, choosing the wrong system may lead to security gaps.

 

Data leak prevention (DLP) systems are one of the oldest types of data protection software. But are they a time-tested solution or an outdated practice? Let’s find out the main pros and cons of data leak...

Category:
May 16, 2019

Establishing privileged account management procedures is an essential part of insider threat protection. This process is unique for each organization, depending on its size, industry, security practices, etc. Fifty-five percent of security officers believe privileged users represent the biggest insider threat to an organization according to the 2018 Insider Threat report prepared by Crowd Research Partners.

 

A well-tuned privileged access management (PAM) solution helps to mitigate this threat. In this article, we talk about the top five examples of poor...

Category:
May 07, 2019

Ekran System is excited to announce integration with Hideez. This cooperation will allow our clients to use Hideez Key for more secure endpoint identity and access management.

 

Incorporated in 2017, Hideez Group is an award-winning high-tech startup located in Virginia, USA. The company produces a unique cybersecurity solution that will protect the digital and real-world identities also of Ekran System users.

 

Hideez Key is a wearable Bluetooth device that contains storage for 1,000 passwords and a programmable 125 kHz RFID chip. It eliminates...

Category:

Pages