What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems...
Free webinar: Tracking Active Directory attacks and user logons
Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used...
Selecting an IAM solution that fits your enterprise
When it comes to managing the identity and access of users, Active Directory leaves a few gaps. These gaps can impact everything from user productivity...
Why password complexity is so important for your organization
Passwords are a big part of your Active Directory (AD) environment. As an administrator, you have to enforce strict password policies to ensure better security...
A spot-on single sign-on solution
Businesses adopt a swarm of applications like G Suite, Office 365, and Salesforce to help employees work more efficiently. This may not always fare well for end users, especially when the number of adopted applications is...
[Free white paper] Benefits of Active Directory-based single sign-on
While many organizations aren’t afraid to adopt multiple applications to increase productivity, they often compromise on certain value-adding features for cost-reduction. One such feature is...
Brazil’s Banco Inter data breach shakes fintech industry
In what is perhaps the largest data breach in Brazil in recent times, a hacker group known as John Carter has stolen over 80,000 users’ personal...
Optimize Office 365 license management with ADManager Plus
In this blog, we’ll discuss the challenges organizations face in optimizing the use of their Office 365 licenses and how they can overcome these challenges using ADManager Plus’ Office 365 reporting feature. During the initial migration...
A future-proof single sign-on solution
With the exponential growth in the number of cloud applications employees use, organizations have begun looking at identity management software to manage their employees’ credentials. With the right identity management software,...