Success stories of our customers
Discover how global companies from different industries secure their business and improve their work with VISULOX.
Introduction of a global PAM solution for role-based administration in the cloud
Implementation of Just in Time access for OT service providers in the KRITIS environment
Blog Articles & Whitepapers
We like to stay up to date. Here you will find our latest events, news and articles on red-hot cyber security topics.
Die VDA ISA 6.0 ab 2023 bringt wichtige Änderungen für TISAX®-Zertifizierungen, bedingt durch die sich stetig verändernde Bedrohungslage.
Learn how German utilities benefit from a central KRITIS-compliant service provider portal like VISULOX: Just-in-time access, session recording and secure file transfer without VPN techniques for increased security and efficiency.
This technical thought leadership article looks at the importance of remote Privileged Access Management (RPAM) for modern enterprises. While VPNs have long been considered the standard method for secure remote connections, this article discusses the challenges of VPNs for remote management of privileged access.
Remote work from the home office should not be equated with the Remote Support be equated with the IT infrastructure. Remote Privileged Access requires high security standards
Secure your remote workforce with just-in-time access! Discover reliable security solutions for your business. Inform & protect now!
As an operator of critical infrastructures in the telecommunications sector, it is essential to ensure all accesses from...
Steps to accelerate the implementation of privileged access management | Find out now about the #1 PAM solution made in Germany.
Learn more about why remote access protection is essential for technical third party risk management.
MFA in the cloud: Increase the security of your data with multi-factor authentication in the cloud. Threat protection, easy to manage.
Zero Trust in Midsize Enterprises. Protect resources and minimize the risk of a data breach with Privileged Access Management, multi-factor authentication and network segmentation. Contact us for your PAM solution
Learn why IT Admin. should not simply work from home & which secure remote access solutions like VISULOX should be used. Book your no-obligation demo now & improve your IT security at home office
PAM software: 10 tips for integrating a PAM solution | A German PAM solution increases security, efficiency and productivity.
GhostSec hackers target critical control systems at industrial facilities. Protection provides remoteSupport solution to control privileged external users
Network control technology, SCADA systems and control stations are nodes in critical infrastructures. Remote access and Remote Support must be secure.
Protecting remote access to OT networks | Remote Support | Cybersecurity | Compliance | Remote Support Software
Establish secure remote access in your company & protect your access ✅ Incl. how-to guide ✅ Find suitable software
Privileged Access Management according to ISO/IEC 27001- Integrate a PAM solution correctly. Compliance ✅ Cyber Security ✅ Risk Management ✅ Where exactly can PAM help?
What is PAM & what should I look for when looking for a Privileged Access Management tool? ✅ PAM software & advice from amitego
German Pam solution seamlessly integrates MS LAPS to enable secure password management on Windows and Linux.
The German remote maintenance solution VISULOX from amitego meets all BSI specifications for secure remote maintenance of industrial plants
IT security is essential for public utilities - we offer central solutions that protect your access and secure critical infrastructures.
amitego has been named a leader and one of the Best-Of Privileged Access Management award winners by Expert Insights for its PAM-Solution VISULOX.
Secure Identity & Access Management (IAM) is crucial for successful digital transformation. We explain what IAM and PAM are all about.
Secure your SCADA environment with a PAM solution and meet the requirements of the NIST standard to increase privileged access protection.
You want to control the data and information transfer between IT systems yourself? With VISULOX according to information classifications to protect against data leakage.
Privileged Access Management: An important building block for the security of critical infrastructures
Privileged access management for critical infrastructures | PAM KRITIS IT-SiG 2.0 | Secure and reliable access control for enterprises
Integrate multifactor authentication - simply and effectively. For internal employees and external IT service providers.
How does Zero Trust work in OT networks and what does it do? | VISULOX offers the solution for a secure network.
MITRE ATT&CK maps possible techniques and procedures of different cyber attacks. A PAM solution protects privileged accounts from being taken over.
Guarantee OT security through the use of Zero Trust solutions, relying on the leading German Privileged Access Management solution (PAM solution).
The urgently needed IoT security gets a new ISO standard: 27400:2022. Access protection to increase cyber security through PAM is part of it.
Achieving TISAX compliance is a major challenge for automotive suppliers. A PAM solution can automatically fulfil many of the controls of the VDA ISA.
VPNs are more widespread, but they pose a high risk. 3 reasons why VPN should be replaced with a PAM solution with Remote Support should be exchanged.
amitego is a participant in the Alliance for Cyber Security. As a German provider of the PAM solution with a focus on remote maintenance, for the protection of critical infrastructures.
Remote access is a risk. A central PAM solution with Remote Support provides supplier security and control over privileged user activities.
VISULOX is one of the leading PAM solutions in the Privileged Access Management, Remote Support and Data Transfer Control among the leading PAM solutions with a focus on remote maintenance.
Implement DevOps while technically maintaining segregation of duties and security zones. Despite the many advantages, DevOps brings new risks.
Remote maintenance and thus access to assets and company secrets that require protection are critical from the point of view of decision-makers, but unavoidable from an operational perspective. What to consider from a risk and management perspective.
After a cyber incident, one thing matters - structure. Read why complete documentation and transparency are worth their weight in gold.
UPDATE October 2022: ISO 27001:2022 has been published! The new version now also breaks down 93 measures into just...