Monthly Digest: July 2019

Aloha, ladies and gentlemen! It looks like we have blinked just a few times… aaand August is already here.

The reason can be that we have worked really hard through all July. To prove it and maybe to show off (just a bit!) we wrote our achievements down, so you can check it out!

What's new and fresh on the site?

The winner's laurel still belongs to cybersecurity and cyber defense companies.
This month, it is not all about “out-of-the-box” solutions. Here are a lot of “making on demand” services so you can neater and more effectively customize your new or old solutions.
Here we have cybersecurity software, automatization and optimization platforms, a pile of info security solutions.

Earlier, we’ve compared some products in the category Project and Portfolio Management, in this table. Now, we have wided the list of products and added to the category PandaDoc, DocuSign, Slack, Dropbox, Google Drive. Soon, there will be an article about these products and their pros and cons, don't miss it.
There is one idiome — there is nothing new under the sun. Though, it does not say if there are anything new near the sun, behind it, maybe below? NASA is trying to answer these questions for nearly 60 years. But have you thought what software do they use? We did. As a result, we have researched the solution which NASA used (to create huge online public library with Universe’s epic photographs) on our site.

This month we are proud of presenting to you the new comparison table. Our experts have compared privileged access management solutions (PAM solutions comparison).

Privileged access management (PAM) is the combination of tools and technology used to secure, control and monitor access to an organization's critical information and resources. Privileged user accounts are desirable targets for an attack as they have elevated permissions, access to confidential information and the ability to change settings. A crucial damage could be made to organizational operations. Types of accounts that implement PAM can include emergency cybersecurity procedure, local administrative, Microsoft Active Directory, application or service and domain administrative accounts.

Comparison table includes:
  • Hitachi ID Privileged Access Manager (secures access at scale, supporting over a million password changes daily and access by thousands of authorized users);
  • WALLIX Bastion Enterprise (enterprise platform for privileged access, session, and password management);
  • Fudo PAM (features of session monitoring, a complete password management solution and a state-of-the-art business intelligence tool).

If for some reasons this table left you unsatisfied, we are reminding you to try out our site and create your own comparison matrix here, simply by selecting products you are interested in, to get a ready-made comparison table.

Also, we recommend you to visit ROI4CIO Facebook, there are some humour and use cases that we don't publish in this blog.

Well, it looks like that’s all for July. Come back here in a month, we will take a look on our summer yield together!


No comments

Powered by Blogger.