Heimdal
Latest Articles

Access Management

Access Management | QUICK READ

Extending Endpoint Security with Zero Trust

Why the Zero Trust Architecture is the New Standard for Your Company’s Security Posture

Access Management | QUICK READ

The Complete Guide to XACML

How to Use XACML to Secure Your Data?

Access Management | INTERMEDIATE READ

Authentication vs. Authorization: the Difference Explained

Authentication and Authorization Concepts. Authentication & Authorization Methods.

Access Management | QUICK READ

Lenovo Laptops Vulnerable to Privilege Escalation Exploit

Users Urged to Upgrade to the Latest Available Version.

Access Management | SLOW READ

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

Application Whitelisting Is a Fundamental Cybersecurity Practice. Learn How to Add It to Your Corporate Network.

Access Management | QUICK READ

Heimdal™ Releases New Zero-Trust Feature for Application Control, Privileged Access Management, and Next-Gen Endpoint Antivirus

A new functionality has been added to three staple Heimdal™ modules. Here’s what you need to know about it.

Access Management | QUICK READ

Hackers Might Gain Admin Rights Through a 16-years-old Vulnerability

Printer Driver Bug in Samsung, Xerox and HP Devices Could Lead to Local Elevation of Privileges.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats