Our website uses cookies. To find out more information on the cookies we use, please head to our privacy policy.OK

News, Blogs & Events

Webinar: Separating People from Passwords with Privileged Access Management

Join our upcoming webinar, where we’ll take you through the journey to PAM: from insecure password management processes through Osirium’s… Read Post

News

Webinar: Osirium and ITHealth – Controlling Privileged Access in Healthcare

Join our upcoming Healthcare webinar, where we demonstrate how Privileged Access Management helps meet the challenges Healthcare organisations face.… Read Post

News

Webinar: An Introduction to Privileged Access Management

Join us on our upcoming free webinar, taking place on Thursday 2nd August 10:00-11:00 am, where we introduce the core concepts of a successful… Read Post

News

Multi-factor Authentication Improvements in PxM Platform Version 6.1.0

We’ve improved our Multi-factor Authentication implementation in the PxM Platform Release 6.1.0 such that it can use authentication services… Read Post

Blog

Using SSH Keys for Authentication in Privileged Access Management

Osirium’s PxM Platform can use both passwords and SSH Keys for the role based connections where the device supports keys.  … Read Post

News

PxM Platform Version 6.1.0. Released

Version 6.1.0 of the PxM Platform made exciting additions to our Privileged Access Management solution. We extended our multi-factor… Read Post

News

Gartner’s Top 10 Security Projects for 2018 lists Privileged Account Management at #1

Privileged Account Management has been ranked by leading global research company Gartner as the number one security project for 2018 that CISOs… Read Post

News

What DevOps need to know about Privileged Account and Credential Security

Working in DevOps, you deal with the credentials needed to access data on applications, systems and devices, so you have a responsibility to… Read Post

Blog

PxM Platform Version 6.0 Released

Version 6.0 of the PxM Platform made exciting additions to our Privileged Access Management and Privileged Task Management functionality, such as… Read Post

News

KuppingerCole Webinar – Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access Management

Join international analyst KuppingerCole and Osirium for a webinar titled ‘Closing the Loop Between Audit and Action: Meet Compliance Needs With… Read Post

News

The education sector must educate themselves on cyber-security

The education sector is becoming increasingly targeted by cybercriminals. We explore why, the impact of breaches, and what the sector can do to… Read Post

Blog

Osirium @ InfoSecurity Europe 2018

Join us at Europe’s number one information security event, Tuesday 5th – Thursday 7th June on stand C240, where we’ll be showcasing our… Read Post

News

Why you shouldn’t be complacent about cloud security

Companies are increasingly dedicating a larger percentage of their IT budgets to cloud computing. We discuss how to manage cloud security, turning… Read Post

Blog

Osirium @ Strategic IT Security Meeting 2018

We’ve been invited to attend this year’s Strategic IT Security event, and are sponsoring a roundtable discussion on PAM.… Read Post

News

Robotic Process Automation (RPA) and Task Automation – extracting business value from the hype

RPA is a hot topic. Our Privileged Task Management module has offered automation for years. So what are the business benefits of RPA, and… Read Post

Blog

Database Task Automation for Asterisk (AsteriskNOW)

We used our Privileged Task Management module to grant secure access to the Call Record Database of our AsteriskNow implementation.… Read Post

Blog

Osirium @ IP EXPO Manchester 2018

All you need to know about how to find us at IP Expo Manchester and our seminar slot: ‘Privileged Access Control & Task Automation: A Win… Read Post

News

Analysts recognise Osirium’s Task Automation innovation

Internationally recognized and independent analysts KuppingerCole and Gartner have been speaking about Osirium’s Task Automation innovation… Read Post

Blog

IT security, efficiency, and the robots making it happen

In the IT security world, with the last 12 months showing us some of terrifying data breaches we’ve ever seen, robots might just be the key to… Read Post

Blog

Using Elastic Stack with the Osirium Privileged Management Platform

Since releasing our Privileged Behaviour Management module we’ve had plenty of customer feedback. Here’s the How-To video for using… Read Post

Blog

Implementing the Dual Account model with Osirium’s PxM platform

The Dual Account model has long been best practice amongst SysAdmins and DevOps. Osirium’s PxM Platform can strengthen the approach.… Read Post

Blog

Meeting significant GDPR needs using Osirium’s PxM Platform

Whilst every cybersecurity company claims they address GDPR requirements, Osirium’s PxM Platform actually does.… Read Post

Blog

Surprising benefits for the Board when you choose Osirium’s PxM

Surprising benefits for the Board when you choose Osirium’s PxM Platform… Read Post

Blog

Cybersecurity in the NHS (part two) – Separating people from passwords

Cybersecurity in the NHS (part two) – Separating people from passwords The Government’s new cybersecurity strategy aims to make the UK the… Read Post

Blog

Osirium signs Progress Distribution

Osirium has today announced an agreement with Progress Distribution.  Since launching its channel programme in early 2017, Osirium has made… Read Post

News

MAP Server – Protecting legacy applications

In any IT environment, there are legacy applications that do something business useful but cannot be replaced. We can help.… Read Post

Blog

Osirium to highlight security issues in utilising the cloud

Andy Harris, CTO at Osirium, has been invited to present at the Digital Health Cloud Summit in London on Wednesday 24th January.… Read Post

News

Cybersecurity in the NHS (part one) – Protecting the NHS from the inside out

NHS databases hold enormous amounts of highly sensitive and valuable information, making them a lucrative target for cybercriminals.… Read Post

Blog

Osirium launches PxM Express

Osirium Technologies plc, a UK-based cyber-security software provider, has today announced the release of their new product PxM Express… Read Post

News

Osirium @ Pycon: Ed Reveals the Patterns in our Pit of Success

Here’s Ed Sharp our Engineering Manager holding court about the patterns of development. His session was at PyCon on Thursday 26th October… Read Post

Blog

Osirium @ Pycon: The story behind the Osirium ‘O’

We’re going to PyCon this week, so if you’re a keen Python developer we’ll see you there! In fact, this year we are a silver sponsor… Read Post

News

Osirium: When your biggest problems are solved, you look to the next one

In one of our recent Technical Stakeholder Meetings, we were musing over the difference between what the Osirium PxM Platform is purchased for… Read Post

Blog

Osirium – Computing Security Awards 2017

The Osirium PxM platform has been recognised as one of the Enterprise Security Solutions of 2017 by Computing Security magazine… Read Post

News

Osirium @ IP EXPO Europe 2017

Osirium will once again be a part of one of the most important Cyber Security events of the year exhibiting on C14 at IP EXPO… Read Post

News

Osirium partners with EB2BCOM in Asia Pacific

Osirium Technologies plc, a UK-based cyber-security software provider, has today announced a new partnership with EB2BCOM… Read Post

News

So What’s Wrong with Blacklisting Commands?

Blacklisting is one of those feature comparisons that really gets Osiriumites annoyed. It is pointless, you can drive a bus through it, and… Read Post

Blog

Osirium Confirms DACH Distribution Partner

Osirium Technologies plc, a UK-based cyber-security software provider, has today announced that it has signed its first distribution partner in the… Read Post

News

Osirium Extends European Presence

Osirium has today confirmed that it will be further expanding into Germany. Riko Schick has been appointed as Business Development Director for the… Read Post

News

Osirium Named a “Cool Vendor” by Gartner

Osirium Technologies plc today announced that it has been included in the list of “Cool Vendors” in the ‘Cool Vendors in Identity and Fraud… Read Post

News

Osirium @ InfoSecurity 2017

Osirium will once again be a part of the most important and largest Cyber Security event of the year exhibiting on stand F210. We will be showcasing… Read Post

News

The rise and rise in cyber fraud (The ‘Insider Threat’)

Cybercrime is no longer solely about external threats; the biggest threat to businesses is now one that exists 24 hours a day from within.… Read Post

Blog

Cyber Essentials: the basics, and exactly why it is essential to you and your business

Cyber Essentials is a government-backed, industry supported scheme designed to provide businesses with a set of measures…… Read Post

Blog

Osirium commits to new UK headquarters

Osirium has committed to UK expansion plans by securing new headquarters in Theale, in the Thames Valley region of Berkshire… Read Post

News

Privileged Access Management integrated with SailPoint’s Identity Governance

We’ve completed our integration with SailPoint’s Identity Governance solution. Here’s a video to introduce the functions and show… Read Post

Blog

IT Security Strategy Meeting, London – March 2017

Osirium have been invited to attend this year’s event offering advice and guidance to decision makers in some of today’s largest businesses… Read Post

News

Osirium launches UK reseller recruitment campaign

Osirium Technologies plc has today announced that it will be launching its channel campaign with the appointment of Distology, effectively immediately… Read Post

News

Osirium extends global footprint to APAC

Osirium Technologies plc has today announced that its market leading Privileged Access Management (PAM) product is now available in the Asia Pacific… Read Post

News

Osirium Strengthens Leadership with Two Senior Appointments

Osirium Technologies plc has today announced that is has appointed Tim Ager as Sales Director and Stephen Roberts as Marketing Director… Read Post

News

Returning from NITEC

For those not familiar with the event, NITEC is a flagship annual event organized by the NATO Communications and Information Agency and the…… Read Post

Blog

Tesco Bank resumes normal service after attack – but has the damage already been done…?

Tesco Bank resumes normal service after attack – but has the damage already been done…?… Read Post

Blog

Enterprise Security & Risk Management 2016

Join us at the UK’s leading event for InfoSec, CyberSecurity and Risk Management, for a packed program including industry experts and case studies… Read Post

News

e-Crime Information Security Mid-Year Summit

Separating people from passwords and how to tell who did what, where and when… Read Post

News

Cyber Defence Summit – Qatar

Demand for cyber-security in Qatar has grown multifold after the most recent cyber attacks and the approved penalty of 1.37 million USD… Read Post

News

Cyber Security Europe at IP EXPO Europe

Cyber Security Europe at IP EXPO Europe offers expert insight and solutions to help you protect your business, and your customers, from a cyber-attack… Read Post

News

Securing Online Gaming 2016

The online gaming industry depends on maintaining customer confidence in its cyber security… Read Post

News

The Cost of Uncertainty

So here we are at another security conference, this time listening to end-user presentations. These presentations are often so much more interesting… Read Post

Blog

Osirium MAPS out its new technology

Credentials never enter the workstation environment and therefore stay secure, ensuring digital hygiene is high even in the case of third party access… Read Post

News

Securing Law Firms

Andy Harris our Head of Engineering will present “Lost data means lost cases and lost reputation, abuse of privileged accounts leads to 99.8% of… Read Post

News

CIO Inspired

Thanks to the cloud and the digital economy, today’s CIOs now have a strong strategic leadership role to play… Read Post

News

Osirium at PCI London June 2016

Osirium are attending the 13th PCI Conference demonstrating our solution in the exhibit area and presenting at a seminar session… Read Post

News

Osirium at NITEC – June 2016

Osirium announced as Winners at NATO Communications and Information Agency (NCI Agency) Defence Innovation Challenge… Read Post

News

Osirium at InfoSec – June 2016

Come and visit at Infosecurity Europe – Stand T20 – June 2016. We will showcase our latest release and fulfill our commitment to always… Read Post

News

Osirium showcase at IDM June 2016

Identity is fast becoming a game changer for large businesses. It is now the focal point of customer relationships and is increasingly a pillar of… Read Post

News

Early versus late data breach outcomes

We spent some time looking at the outcomes for companies that were the victims of cyber breaches, comparing those who experienced early data… Read Post

Blog

Osirium showcase at GovSec May 2016

The 3rd annual GovSec conference will explore how public sector organisations and professionals can make sense of securing their functions in a… Read Post

News

IAM Round Table Notes

Yesterday we attended a round table session about building effective Identity and Access Management solutions. Before we got into the subject, there… Read Post

Blog

Beer, Food, Comedians and Cybersecurity in London

We will be kicking off a workshop discussion on Privileged Access Management and how this relates to Privileged Users by preventing and deterring… Read Post

News

Osirium Accelerates Global Channel Recruitment Plans

Osirium Technologies plc, has today announced that it has appointed its first distribution partner in MENA region… Read Post

News

The JPMorgan Breach and the Problem with Passwords

 The JPMorgan Breach and the Problem with Passwords… Read Post

Blog

Separating people from passwords

We explore why rigorous password policies are creating the exact opposite of what they intend to do, and the only viable alternative.… Read Post

Blog

Securing Online Gaming

Securing Online Gaming We were told that Online Gaming is a £21 Billion market (a bit of googling reveals much higher figures, especially for Asia… Read Post

Blog

Want to Follow GCHQ’s Best Practise Password Advice? Look No Further

If the documents leaked by NSA whitsleblower Edward Snowden are anything to go by, GCHQ knows a thing or two about exploiting security weaknesses to… Read Post

Blog

US Government’s 30-Day Authentication Sprint Points the Way for UK Firms

The US government has been the subject of some fierce criticism of late for apparent security failings which allowed attackers to steal highly… Read Post

Blog

Brute force bugs highlight the weaknesses of human generated passwords

Passwords are one of the biggest threats to enterprise data security around today; barely a month seems to go by without another major news story… Read Post

Blog

How to present Cyber Security issues to the Board | Osirium

Everyone has a unique view of what a board meeting is like and what the board actually care about. Here, Andy Harris explores how to communicate… Read Post

Blog

Why do IT administrators want Identity & Access Management?

IT administrators already know that Identity and Access Management (IAM) would make their life easier and your organisation more secure. But many… Read Post

Blog

CISO Message to the Board about Breaches

It’s very clear to us how hard CISOs work to prevent breaches and how their influence is often limited in the face of perceived business… Read Post

Blog

What We Can Learn From the OPM Breach

Details are starting to filter through about the true size and scale of the recent data breach at the US Office of Personnel Management (OPM). But… Read Post

Blog

Protecting POS: Why You Need to Guard Privileged Remote Accounts

Earlier this month the FBI was forced to issue yet another private malware warning to companies in the US after a new attack campaign against a… Read Post

Blog

PuTTY Problems: Solving Threats with Privileged User Management

This week, Symantec warned firms of a malicious version of PuTTY – a popular open source tool frequently used by IT administrators. It’s thought… Read Post

Blog

Osirium Research Points Out Perils of Password Shoulder Surfing

Technological innovation moves at a relentless pace. It’s hard to believe sometimes that the original iPhone launched just eight years ago. Ditto,… Read Post

Blog

Privileged Account Abuse, Not Smartphone ‘Bans’ The GCHQ Story

Much of the talk in IT security circles over the past week has been centred around new guidance for businesses from the UK’s spy agency.… Read Post

Blog

Targeted Attacks – The Fight Back Starts with Good Password Management

When business and IT leaders see stories about “targeted” attacks and APTs in the news, the perception is often that they are so-called because… Read Post

Blog

Take Care with Third Parties

Do you feel confident about the security of your corporate account access controls? Can you say the same about those of your partners and contractors?… Read Post

Blog

In a regulated world ignorance is dangerous!

The evidence points to Data Breaches being taken more seriously year on year. There has been a yearly increase in fines revenue from Data Protection… Read Post

Blog

Anthem’s Breach damages Customer Confidence

If your organisation uses on-line customer interaction, you need to take note of customer sentiment regarding data breaches. This holds true for all… Read Post

Blog

Passwords aren’t the problem – people are

Not a day goes by without another blog on how bad passwords are. Everytime we look at these blogs we see that consistently the issue is people and… Read Post

Blog

Osirium Named as Partner in Lockheed Martin’s Virtual Technology Cluster

Osirium are pleased to be working alongside Lockheed Martin as part of their Virtual Technology Cluster (VTC). Osirium were chosen as a partner… Read Post

News

15 Top Excuses for not changing Passwords

Sony, Target, JP Morgan, so many cyber attacks this year, and we’re still finding passwords that have never been changed, we’ve picked… Read Post

Blog

Osirium is safe from Shell Shock

Osirium is not affected by CVE-2014-6271 (“Shellshock”). Our use of modern web technologies ensures that all Osirium servers, regardless… Read Post

Blog

Osirium is great for meeting MAS/TRM compliance

Since the Monetary Authority of Singapore issued their Technology Risk Management Guidelines they have achieved a lot of traction with compliance… Read Post

Blog

Why do IT administrators want automation? | Osirium

We recently ran a survey to Security Administrators via the LinkedIn Information Security community. We received over 450 responses from around the… Read Post

Blog

Comparing Human and Osirium Generated Passwords

We set out to compare the ease of compromise of human passwords versus Osirium generated passwords. It was a run on John the Ripper that sparked off… Read Post

Blog

Protecting MSSQL from the Insider threat

IT Security is a very wide ranging subject. At Osirium we like to think of its application to the business stack. By this we mean all the components… Read Post

Blog

Have I been pwned?

A website has recently been launched which allows users to check if their email address is on any of the account lists of online services who have… Read Post

Blog

The Files Menu

This week we’ve been looking at an under-used but rather interesting corner of Osirium, the files menu.… Read Post

Blog

Osirium Launch inaugural eNewsletter

The first issue of the Osirium Newsletter contains information and tips around the topic of “Insider Threat”. It covers some of the… Read Post

News

UK businesses warned to urgently review privileged credentials policies

Osirium, a leader in Privileged User & Infrastructure Management today shared recent research findings which it hopes will encourage businesses… Read Post

Blog

Osirium announces partnership with one of the UK’s leading security solutions integrators

Osirium, a leading provider of Privileged Management solutions today announced that it has entered into partnership with Armadillo Ltd., one of the… Read Post

News

Mitigating Insider Threats posed by Privileged Users

Osirium, a leader in Privileged Management has today announced the release of Privileged Session Recorder (PSR) which successfully reduces the… Read Post

News

UK businesses admit to over-privileging IT staff

Osirium, a leader in Privileged User Management today released research findings which show that 70% of UK companies are finding it difficult to… Read Post

Blog

Delegation failures suffocating UK businesses

Osirium, a leader in Privileged User Management has today shared research findings which suggest that UK IT management is failing to reduce the… Read Post

Blog

Back-up protocols often ignore security devices

Osirium (www.osirium.com) a leader in Privileged User & Infrastructure Management has today warned organisations to carefully review back up… Read Post

Blog

Osirium launches SysAdminAssist, its first freeware application

Osirium, a leader in Privileged User & Infrastructure Management has today announced that it has released a freeware application –… Read Post

News

Poor business practise leaves SysAdmins guessing device IDs

Osirium has today released research findings that should encourage organisations to increase awareness of potential operational risks within the… Read Post

News

Legacy privileged accounts make UK businesses vulnerable

Osirium, a leader in Privileged User & Infrastructure Management has today released recent research findings which indicate that the… Read Post

News

UK Organisations still Haunted by Group Admin Accounts

Osirium, a leader in Privileged User & Infrastructure Management has today warned businesses about continuing with the use of Group Admin… Read Post

Blog

Serious Data Breach Threats from Inadequate “end-of-life” IT Procedures

Serious Data Breach Threats from Inadequate “end-of-life” IT Procedures Osirium (www.osirium.com) a leader in Privileged User &… Read Post

Blog

Osirium launches sales enablement toolkit with channel app

Osirium, a leader in Privileged User & Infrastructure Management has today launched its new sales enablement toolkit.… Read Post

News

Deceptive IT practises put Audits at risk

Osirium, a leader in Privileged User & Infrastructure Management has today released findings from a new, independent, security focused research… Read Post

Blog

Osirium overcomes a key issue for CoCo Compliance

Osirium, announced today that its solution – Osirium USIM –  now has the technical capabilities to solve a key problem faced by Local… Read Post

News

Osirium solves a critical privileged user security gap

Osirium announced today that its solution enables organisations to identify and remove hidden and unused privileged legacy accounts on IT devices… Read Post

News

The Danger of Adding Custom Back-up Scripts to Devices

The Danger of Adding Custom Back-up Scripts to Devices… Read Post

Blog

Evolution of Osirium

Every time we discuss the idea of what Osirium can do we seem to find new and ever growing features and benefits it can offer.… Read Post

Blog

IT Security Expert Announces Osirium

Osirium, a new and unique IT security solution was today announced by ex-MIMEsweeper co-founder and industry expert David Guyatt. Osirium brings… Read Post

News

The Nuisance of Compliance

So it’s that time of year again, the auditors are back in. They have spent the last 11 and a half months locked in a cupboard reading the latest… Read Post

Blog

Take the Complexity out of Monotonous Tasks

An IT Manager and mate of mine did his least favourite task yesterday. He had to fire someone. Never nice, never easy.… Read Post

Blog

SysAdmin Nightmares

I was in a meeting with a customer yesterday and I was empathising with the IT manager as to his current SysAdmin nightmares. Unfortunately, I… Read Post

Blog