Partner Details
Theale Court, 11-13 High Street • RG7 5AH Theale, Reading, Berkshire • United Kingdom
Phone: +44 (0)118 3242444
Email: info@osirium.com
Internet: https://osirium.com/
Founded in 2008 and with its HQ in the UK, near Reading, UK Osirium’s management team has been helping many organisations over the past 25 years protect and transform their IT security services.
The Osirium team have intelligently combined the latest generation of Cyber-Security and Automation technology to create the world’s first, built-for-purpose, Privileged Protection and Task Automation solution for the Hybrid-Cloud world.
Tried and tested by some of the world’s biggest brands and public sector bodies, Osirium helps organisations drive down Business Risks, Operational Costs and meet IT Compliance.
Osirium is backed by venture investors who have an established track record in identifying emerging market leaders.
Sponsored Events
Date | Title |
---|---|
Mar 03, 2020 |
Webinar
Solving Problems in Privileged Access Management with AutomationWhile businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves. |
May 29, 2019 |
Webinar
The Compelling Need for Privileged IT Process AutomationIT processes can often be repetitive and many of these tasks can take companies a lot of time and costs, putting pressure on highly skilled IT staff. By automating IT processes, companies can not only become more productive and efficient but also relieve the load on their IT department. |
Jun 27, 2018 |
Webinar
Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access ManagementPrivilege Management has been a key element of both IAM (Identity & Access Management) and cybersecurity programs for years. However, increased complexity of modern corporate IT infrastructures and mounting pressure from compliance regulators force privilege management solutions to constantly expand their scope into new functional areas. From simple password vaults to advanced monitoring and behavior analytics to governance and compliance – a modern PxM solution permeates every corner of your enterprise IT infrastructure. |
Jun 22, 2017 |
Webinar
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged AccountsPrivilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect. |
Reports
Date | Title | Price |
---|---|---|
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators… |
€1295.00 |
May 27, 2019 |
Executive View: Osirium Opus Privileged IT Process Automation - 79068Osirium Opus is a specialized solution that focus on IT Process Automation for privileged tasks. It works standalone or in combination with other ITSM solutions such as Service Now. Opus… |
€190.00 |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the… |
€1295.00 |
Jan 12, 2018 |
Executive View: Osirium: Privileged Access Management - 70836Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of… |
€190.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Videos
Date | Language | Title |
---|---|---|
Mar 04, 2020 |
![]() |
Solving Problems in Privileged Access Management with AutomationWhile businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT ... |
May 31, 2019 |
![]() |
The Compelling Need for Privileged IT Process AutomationIT processes can often be repetitive and many of these tasks can take companies a lot of time and costs, putting pressure on highly skilled IT staff. By automating IT processes, companies can not only become more productive and efficient but also relieve the load on their IT department. |
Jun 27, 2018 |
![]() |
Closing the Loop Between Audit and Action: Meet Compliance Needs With Privileged Access ManagementPrivilege Management has been a key element of both IAM (Identity & Access Management) and cybersecurity programs for years. However, increased complexity of modern corporate IT infrastructures and mounting pressure from compliance regulators force privilege management solutions to constantly exp... |
Jun 23, 2017 |
![]() |
Delegate the Task, Not the Privilege: How to Simplify and Secure Your Privileged AccountsPrivilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forc... |
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Blog
Informatica is Moving Data Management to the Cloud


Introducing Intelligent Data Management Cloud (IDMC) as a Comprehensive, Cloud-Native, and Cloud-First Approach to Data Management Data is the new gold, the new oil, or whatever. In the cloud, you only own the data, but not the applications, systems, or networks anymore. Data is essential for Digital Transformation. There is so much data that is sprawling that it is hard to keep control of it. And, within the SaaS and PaaS tenants, data is what belongs to the tenant. Many organizations fail in [...]
Latest Insights