Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively.

Data sprawl—defined as the proliferation …

General 3 min read Read

Top three reasons passwords are here to stay as the primary form of authentication

Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in 2019 most of us are still logging on to various platforms using passwords. Passwords have been an essential part of authentication from …

General 2 min read Read

The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an indispensible tool for today’s workforce. Browsers have also become the weak link that cybercriminals are exploiting to target organizations. Unfortunately for these organizations, restricting access to the internet …

General 3 min read Read

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps is just a buzzword, a far-fetched reality, or simply the next evolutionary state of DevOps.

General 3 min read Read

Boost your organization’s productivity with these 5 password management techniques

For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail, Outlook, and other …

General 2 min read Read

SSO for cloud apps in hybrid Active Directory

Single sign-on (SSO) in Azure Active Directory (AD) allows users to easily and securely sign on to cloud applications using their Azure account credentials. Without SSO, administrators need to create and update user accounts for various applications, including Office 365, …

General 1 min read Read

India, our Cybersecurity and Hybrid Identity Management seminars are heading your way

The Indian leg of our Cybersecurity and Hybrid Identity Management seminar series is all set to take place in four cities this June and July. Join our technical evangelists as they explain Active Directory and IT security best practices utilized …

General 1 min read Read

[Infographic] Still manually onboarding users into Active Directory? There’s a better way!

In our previous blog post, we had touched upon the top three password related issues that plague IT admins. In this blog, we will take a look at how even something as simple as user provisioning is actually a …

General 2 min read Read

Five worthy reads: Smart Spaces—for smart work or smart theft?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about Smart Spaces and the pros and cons businesses must note before deploying them.

Smartphones, smart TVs, …

General 3 min read Read