5 Essential Ingredients of a Successful Access Management Strategy. Read More>>


RBI Guidelines On Information Security

What prompted the RBI Guidelines on Information Security?

The rapid and ever-increasing digitization of financial transactions and account operations in India has led the Reserve Bank of India to issue certain guidelines on Cybersecurity. These guidelines were issued due to some common errors found in the cybersecurity infrastructure of banking institutions. The most important issues banks faced were a lack of IT governing framework, absence of real-time end-user monitoring, inadequate authentication mechanisms, absence of privileged credentials management (no randomization and vaulting of passwords), absence of fine-grained control over privileged users (absence of principle of ‘least privilege’), and a lack of reporting on privileged activities.

What are the RBI Guidelines on Information Security?

The RBI mandates end-to-end protection of customer data, advanced real-time threat detection, user access control & management, vulnerability assessments and seamless monitoring of user activities, and extra focus on extended networks in a shared environment.

Download RBI Circular Document

How does ARCON | Privileged Access Management (PAM) ensure privileged access security?

ARCON | Privileged Access Management (PAM) solution is a powerful tool to mitigate malicious insiders and third-party threats to privileged accounts. The too

Provides a secure gateway to target devices

Enables IT Security and Compliance management officers to nurture best privileged access management practices

Enforces a role- and rule-based access control framework

Builds a robust identity and access control framework

Request A Demo

Feel free to drop us an email, and we will do our best to get back to you within 24 hours.

Become A Partner