Ekran System Blog

News, opinions, and industry insights

February 04, 2019

Access control is a fundamental element of the security infrastructure of any company. Every security officer wants to apply the principle of less privilege, zero-trust, segregation of duties, and other best practices without harming the company workflow.


There are several approaches to organizing an access management system. In this article, we analyze the two most popular access control models: role-based and attribute-based. We’ll talk out the pros and cons of each model, compare them, and see if it’s possible to combine them.


February 01, 2019

Ekran System is appreciated by our customers and recognized by industry experts as one of the best insider threat prevention platforms. And we’re proud to announce that FinancesOnline, a reputed B2B software review platform, has honored Ekran System with two prestigious awards ― Premium Usability and the Rising Star of the year 2018.


Top benefits of Ekran System according to FinancesOnline


In its Ekran System overview, FinancesOnline emphasized some of the most important benefits of our platform.


Unintrusive activity...
December 18, 2018

Companies believe their security systems to be unbreachable until the very moment they face the consequences of a data leak.


You’ve probably seen the number $3.86 million in lots of articles covering the cost of a data breach. This is the average cost of a data breach according to the 2018 Cost of a Data Breach Study by Ponemon Institute. What’s more alarming is that this figure is growing every year.


The financial consequences of a data leak depend on many variables: the time to detect the leak, the type and amount of information...

October 08, 2018

Opportunities are tricky: they can make people do things they would never do under other circumstances.


A dismissed employee can try to steal or alter business-critical data if they haven’t been blocked from accessing your system. A third-party contractor can cause a serious data breach if granted too many rights within your network. These people may never plan to attack you on purpose but still can become serious threats to your company’s cybersecurity when given the opportunity.


In this article, we focus on opportune insider...

August 31, 2018

Most stationary workstations have at least two USB devices plugged in all the time: a keyboard and a mouse. Apart from that, we occasionally connect mass storage devices, printers, scanners, and cameras, or simply charge our phones through USB. While it’s comfortable to use these devices, each connection can be a serious risk for an organization’s security. The reason is that USB devices can be infected with malware that attacks your corporate system once a device is connected.


Have you already included USB devices in your corporate security...