Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps...
Boost your organization’s productivity with these 5 password management techniques
For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail,...
SSO for cloud apps in hybrid Active Directory
Single sign-on (SSO) in Azure Active Directory (AD) allows users to easily and securely sign on to cloud applications using their Azure account credentials. Without SSO, administrators need to create and...
India, our Cybersecurity and Hybrid Identity Management seminars are heading your way
The Indian leg of our Cybersecurity and Hybrid Identity Management seminar series is all set to take place in four cities this June and July. Join our...
[Infographic] Still manually onboarding users into Active Directory? There’s a better way!
In our previous blog post, we had touched upon the top three password related issues that plague IT admins. In this blog, we will take a...
Five worthy reads: Smart Spaces—for smart work or smart theft?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about Smart...
The IT admin’s worst nightmare: Stolen passwords [Webinar]
Passwords are the virtual keys that protect an organization’s network resources and user accounts from unauthorized intrusions. As such, it’s unsurprising that passwords are major targets for cybercriminals. However, users create weak...
Identify and avoid insider threats [Webinar]
According to the 2018 Insider Threat Report, 90 percent of organizations believe they’re vulnerable to insider threats. By insider threats, we’re not just referring to a disgruntled employee...