CATEGORIES

soffid

Why Privileged Access Management (PAM) is so essential?

At the heart of remote cybersecurity is Privileged Access Management (PAM). It's the protection around sensitive and privileged user accounts, which are the crown jewels for cybercriminals. For the channel, PAM creates a new revenue stream and further business...

A convergent approach to enterprise security

Globalization, easy access to information, exponential growth of immigration and society diversity, worldwide political and cultural conflicts, all these phenomenons have impacted the threat paradigm of security that has also been immutably changed by domestic and...

Soffid 3.3.X: An improved version of our platform

In today’s digital world, enterprise IT and security professionals are increasingly seeking identity and access management (IAM) services to provide secure and positive customer experiences. We’re excited to announce the general availability of Soffid 3.3.X, our...

Cybersecurity, a growing priority

Recently, there has been a staggering rise in cybersecurity threats. This is primarily due to the coronavirus pandemic. Increased geopolitical tensions, and cloud and IoT adoption have made companies vulnerable to more frequent and damaging cyber-attacks creating a...
Top 7 cybersecurity trends

Top 7 cybersecurity trends

Cybersecurity threats are constantly evolving, making it difficult to keep up with the latest trends and protect your organisation's sensitive data. In today's post we share the 7 hottest trends in...

read more
Soffid 3.3.X: An improved version of our platform

Soffid 3.3.X: An improved version of our platform

In today’s digital world, enterprise IT and security professionals are increasingly seeking identity and access management (IAM) services to provide secure and positive customer experiences. We’re excited to announce the general availability of Soffid 3.3.X, our...

Cybersecurity, a growing priority

Cybersecurity, a growing priority

Recently, there has been a staggering rise in cybersecurity threats. This is primarily due to the coronavirus pandemic. Increased geopolitical tensions, and cloud and IoT adoption have made companies vulnerable to more frequent and damaging cyber-attacks creating a...