Category: <span>solutions</span>

Unix & Privileged Access Management (PIM or PAM)

As the number of cyber-attacks increase, the need for organizations to increase their security posture has become more evident. Securing and managing privileged accounts by implementing a robust Privileged Identity & Access Management (PIM or PAM) must be a high priority. Privileged Users Privileged Users are identities that have the capability of performing administrative functions,
Read More

Breaking Silos in Network Security, using GRC

Breaking silos in Network Security using Governance, Risk & Compliance It is well-established that as new technologies continue to emerge, new threats and motives behind them correspondingly evolve. From script-kiddies and hackers to cyber-terrorism and cyber-crime such as corporate espionage, there is a whole new underworld economy. It is not just iPods and iPads that
Read More

Weblogic Authentication Failed Due to Results Time Limit Setting

Recently at a client we were seeing intermittent Authentication errors with the following in the logs: Caused by: javax.security.auth.login.FailedLoginException: [Security:090304]Authentication Failed: User xelsysadm javax.security.auth.login.FailedLoginException: [Security:090302]Authentication Failed: User xelsysadm denied at weblogic.security.providers.authentication.LDAPAtnLoginModuleImpl.login(LDAPAtnLoginModuleImpl.java:261) We were not seeing the issues regularly, only during periods of high activity. As a result of not being able to replicate the issue reliably,
Read More

Automatically Create An Account In Active Directory When Reading In A Flat File from Aveksa Compliance Manager

The challenge is: How do you make Aveksa Compliance Manager automatically create a User account object in Active Directory after running a collection (& unification) for all new users. This should be pretty easy… right, but it’s not as easy as you think so I built a mindmap which explains the process:     Create an
Read More