Identity and access management | May 23, 2019Detecting changes in privileged accounts in Azure AD Monitoring and protecting privileged accounts is paramount because failure to do so can...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
Identity and access management | December 19, 2018Monitoring users for unusual file activity As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar] If organizations and administrators can be alerted when they're under attack, then they...
Identity and access management | November 1, 2018Secure workstations by monitoring and alerting on membership changes in the local Administrators group, Part 2 In Part 1, we touched on how routine monitoring of object life cycle changes in the local...
Identity and access management | October 11, 2018Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1 Imagine you're an admin in a company that prides itself on its security practices, which...
Identity and access management | October 5, 2018Auditing and securing Active Directory webinar series With the number of data breaches increasing by the day, enterprises need to closely...
Identity and access management | July 19, 2018Securing and protecting Active Directory and Windows networks webinar series Recent attacks have proven that additional work needs to be done to secure our Windows...
Identity and access management | June 14, 2018Free webinar: Tracking Active Directory attacks and user logons Microsoft Active Directory is the center of most enterprises' network identity management....
Identity and access management | June 7, 2018Selecting an IAM solution that fits your enterprise When it comes to managing the identity and access of users, Active Directory leaves a few...
Identity and access management | April 19, 2018Use change monitoring to never let a change go unnoticed in Active Directory Active Directory relies on services distributed across many, interdependent devices in...