Ekran System Blog

News, opinions, and industry insights

February 04, 2019

Access control is a fundamental element of the security infrastructure of any company. Every security officer wants to apply the principle of less privilege, zero-trust, segregation of duties, and other best practices without harming the company workflow.


There are several approaches to organizing an access management system. In this article, we analyze the two most popular access control models: role-based and attribute-based. We’ll talk out the pros and cons of each model, compare them, and see if it’s possible to combine them.


February 01, 2019

Ekran System is appreciated by our customers and recognized by industry experts as one of the best insider threat prevention platforms. And we’re proud to announce that FinancesOnline, a reputed B2B software review platform, has honored Ekran System with two prestigious awards ― Premium Usability and the Rising Star of the year 2018.


Top benefits of Ekran System according to FinancesOnline


In its Ekran System overview, FinancesOnline emphasized some of the most important benefits of our platform.


Unintrusive activity...
December 18, 2018

Companies believe their security systems to be unbreachable until the very moment they face the consequences of a data leak.


You’ve probably seen the number $3.86 million in lots of articles covering the cost of a data breach. This is the average cost of a data breach according to the 2018 Cost of a Data Breach Study by Ponemon Institute. What’s more alarming is that this figure is growing every year.


The financial consequences of a data leak depend on many variables: the time to detect the leak, the type and amount of information...

May 17, 2018

An appropriate level of privileged account control and management plays a significant role in ensuring your organization’s cybersecurity. Verizon reports that in 2017, privilege misuse was behind 12% of all security breaches.

And according to Gartner, by 2020, the lack of Privileged Account Management (PAM) processes will be the cause of more than half of all security failures associated with IaaS and PaaS services.


Monitoring and managing accounts with privileged access is one of the main requirements of leading compliance standards such as HIPAA and...

June 06, 2016

Last year saw a rise in cybercrime across the board, and this year so far, appears to display the same trends. With handsome prices being paid for credit card data on black markets worldwide, criminals doubled their efforts in stealing it. While banking institutions are on top of things and seem to be well armed to fend off both intruders and malicious insiders, service industry with its poor state of security looks like an easy target.


Hospitality industry especially received a huge blow last year, with all the major franchises compromised in one...