Free resources that will help you tackle your IAM and IT security challenges. 

Best practices

Why you need to think beyond PowerShell for IAM


Five Identity and access management concerns you need to solve right now


Five reasons why you need to automate the IAM process


An admin's guide to boosting your Office 365 secure score


Office 365 service health monitoring


Five steps to remediate your compromised Office 365 account


5 IT security red flags you need to watch out for


FBI recommendations to prevent ransomware


Insider threat management handbook


Five things you should know about User Behavior Analytics (UBA)


The eight most critical Windows security event IDs


Importance of data discovery in GDPR


[Whitepaper] Automate compliance reporting for all major audits


[Whitepaper] Group Policy change monitoring, reporting, and alerting


[Whitepaper] True continuous auditing for Active Directory


Two-factor authentication for enterprise applications


Self service directory update for Active Directory (AD)


Why passwords are here to stay and how IT admins can stay in control of password management


Password Expiration notifier free tool


Exchange Online backup: Do you really need it?


Basics of SQL server log auditing


Securing your network perimeter with SIEM


Top 5 Critical Alerts you need for IT security


Five tell-tale signs you're heading for a compliance violation


The ultimate AD change management game plan


Five simple hacks for secure IAM


Six surefire ways to protect your network from impending privilege abuse attacks


Seven best practices to secure your Office 365


The US Department of Homeland Security's best practices for Office 365


Eight best practices to prevent Ransomware


Ten best practices to fight insider threats


Six best practices for deploying a Data Loss Prevention solution


How to protect your organization from Ransomware


Impact of Ransomware on HIPAA


How User Behavior Analytics (UBA) helps combat the major challenges of insider threat detection


The cost of storing Stale Files


Password issues are a costly affair


Busted: Three identity and access management myths


Three challenges admins face while defending insider threats and how UBA helps overcome them


Beginner's guide to Azure AD password protection


How to check user login history


How to configure advanced audit policies


How to monitor password reset requests in Active Directory


AD & IT Security webinar series


Hybrid Active Directory Auditing and Security webinar series


Find weak Active Directory passwords- Enforce a custom granular password policy


New features of ADManager Plus: Let's bring you up to speed


Tips and tricks to achieving effective SIEM


Uncomplicate Active Directory backup and recovery in under 30 mins


Everything you need to know for efficient AD adminstration


Mitigating insider threats with User Behavior Analytics


SIEM for beginners


Secure, on-the-go Active Directory password self-service


Enterprise Single-Sign On Solution

  • Please enter business email only.
    Please enter business email address
    By clicking 'Enable Access', you agree to processing of personal data according to the Privacy Policy.