I’m excited to share the news that effective today, Bomgar has completed the acquisition of Lieberman Software. Bomgar and Lieberman both have a strong focus on product innovation, outstanding customer experience, and a desire to enable our customers to effectively address cybersecurity threats. We expect our customers and partners to start seeing benefits very soon as the two companies move quickly to complete the integration.
Interest in cyber attacks – and methods for defeating them – drove a record amount of traffic to the Identity Week blog in 2017. Here are our top 5 blog posts in 2017, according to number of visitors.|
What’s the profile of a privileged identity management product user? What problems is he trying to solve? We thought we’d answer those questions from the perspective of one of our actual customers – with names changed at his request.
Aberdeen’s model demonstrates that proactively managing privileged access quantifiably reduces the risk of a data breach by up to 80%.
By following the steps outlined here, you can allow the root password of your Mac systems to be managed by automated processes that would randomly generate a new password on a regular basis or following password recovery.
In a rush to stay ahead of a heavy workload, your IT admins could be taking more shortcuts than you’d expect. And perhaps no aspect of IT suffers more from cutting corners than security. Here are five facts about cyber security that your IT staff probably don’t want executives and employees to know.