For information security, the year 2012 has indeed started off with a shocking note. Zappos.com, one of the largest online retailers dealing with shoes and...
Password Manager Pro is worth every penny, say our customers!
There can’t be a better finish to an eventful year. As 2011 is drawing to a close, we are hearing feedback from scores of highly...
Password Manager Pro emerges the top choice of IT Managers across the globe in 2011
2011 is fast drawing to a close. While looking ahead for a great holiday season and a wonderful New Year 2012, we just looked back...
The Perils of Non-Compliance
The word ‘compliance’ has come a long way in the English dictionary. It might have started as yet another addition to the vocabulary, but now...
How do you control concurrent privileged access to sensitive IT resources?
In enterprises, quite often, many administrators might be accessing a system in production environment concurrently. They might be attempting to carry out conflicting operations, unconnected...
Why IT Matters
When I was in business school in the late 1990’s, we learned about Total-Factor Productivity (TFP). That’s the factor or coefficient that, when combined with...
How do you share privileged passwords in your enterprise? [Part-3]
In the previous two posts , we discussed the casual manner in which privileged passwords are shared among various works groups in enterprises and the...
How do you share privileged passwords in your enterprise? [Part-2]
In the previous post, we had highlighted the casual manner in which privileged passwords are shared among various works groups in enterprises. Let us now...
How do you share privileged passwords in your enterprise? [Part-1]
Assume that you are an IT administrator managing servers, databases, network devices and numerous other IT applications. All these resources are accessed/controlled through administrative passwords...