Identity and access management | June 10, 2019[Infographic] Top three approaches to dealing with account lockouts In the previous blog of this series, "[Infographic]Three tips to simplify Active Directory...
ADAudit Plus | June 6, 2019[Infographic]Three tips to simplify Active Directory compliance and auditing In the previous blog of this series, "[Infographic] Still manually onboarding users into...
General | June 5, 2019SSO for cloud apps in hybrid Active Directory Single sign-on (SSO) in Azure Active Directory (AD) allows users to easily and securely...
Identity and access management | May 23, 2019Detecting changes in privileged accounts in Azure AD Monitoring and protecting privileged accounts is paramount because failure to do so can...
ADSelfService Plus | May 17, 2019Two-factor authentication for secure access to cloud apps in hybrid AD In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in...
ADSelfService Plus | May 16, 2019Empower users to securely reset passwords from the login screen of their machines With so many rapid technological advances, today's employees break all the usual work...
General | May 2, 2019The IT admin's worst nightmare: Stolen passwords [Webinar] Passwords are the virtual keys that protect an organization's network resources and user...
Identity and access management | March 27, 2019Self-service password reset in a hybrid Active Directory environment Password reset tickets constitute a major chunk of the help desk ticket pile. Allowing...
General | March 20, 2019How strong are your passwords? If you're in IT, you likely know that you should never use weak passwords to secure your...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
ADAudit Plus | February 25, 2019Quick tips to ensure your Azure AD is safe from threats Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...
Identity and access management | February 14, 2019File server auditing: Excluding certain files and file types In order to improve the efficiency of audit reports, administrators auditing a file server...