Why this renowned IT expert believes that ManageEngine’s IAM solution is better than native AD tools for SMBs

Martin Kuppinger is the founder and principal analyst at KuppingerCole, one of the industry’s leading analyst firms. With over 25 years of experience in the IT industry and...

AD360 1 min read Read

How to make password management more secure and efficient

Among the various tasks that IT administrators carry out on a daily basis, password management takes center stage. Gartner estimates that about a third of help desk calls are...

ADSelfService Plus 1 min read Read

There’s more than one way to get admin privileges

Active Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of...

General 2 min read Read

Keeping up with compliance regulations like the GDPR and CCPA – Free webinar

The EU’s GDPR and California’s CCPA are two of the world’s most prominent data regulations. Similar laws have been passed in several countries, including Japan,...

Log360 1 min read Read

Managing updates to local cached credentials for remote users in a hybrid Active Directory environment

Among the many issues remote users face, forgotten passwords can be a significant roadblock to productivity, as they require help from an administrator. When a user logs...

ADSelfService Plus 2 min read Read

Active Directory authentication protocols and security risks

For organizations to maintain security and reduce their threat exposure, it’s critical to understand the vulnerabilities and challenges of Windows authentication protocols. For instance, the inherent...

Active Directory 2 min read Read

Zooming in on UEBA: Answering the “what” and the “how” 

What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of...

Log360 3 min read Read

Azure AD Password Protection: The good, the bad, and the ugly

People often use common words as their passwords so they don’t forget them. This practice impacts security severely, making it easy for hackers to easily breach accounts by guessing these common passwords. Microsoft’s Azure...

ADSelfService Plus 3 min read Read

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to...

ADAudit Plus 2 min read Read