• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog / Identity and access management

How ADAudit Plus eliminates auditing blind spots and provides granular visibility into your AD environment

ADAudit Plus | April 13, 2026

How ADAudit Plus eliminates auditing blind spots and provides granular visibility into your AD environment

Active Directory (AD) auditing focuses on topics such as who did what, when, and from...

Best passwordless authentication solutions for 2026

ADSelfService Plus | April 10, 2026

Best passwordless authentication solutions for 2026

The uncomfortable truth is this: Passwords are still the weakest link in identity security...

Federated single sign-on: Simplifying cross-domain access

ADSelfService Plus | April 6, 2026

Federated single sign-on: Simplifying cross-domain access

As organizations expand their digital ecosystems by adopting cloud applications, enabling...

What major cyberattacks reveal about the cost of slow recovery

RecoveryManager Plus | April 1, 2026

What major cyberattacks reveal about the cost of slow recovery

Cyberattacks often succeed not because they are sophisticated but because organizations...

What is attack surface management?

ADManager Plus | March 31, 2026

What is attack surface management?

Attack surface management is the continuous process of monitoring, discovering, and...

 Best multi-factor authentication apps for enterprises in 2026

ADSelfService Plus | March 30, 2026

Best multi-factor authentication apps for enterprises in 2026

Today, organizations operate in highly distributed environments where employees access...

The NotPetya attack: What it teaches us about cyber survival

RecoveryManager Plus | March 25, 2026

The NotPetya attack: What it teaches us about cyber survival

In June 2017, the world witnessed one of the most destructive cyberattacks in history: the...

2FA vs. MFA: What’s the difference and which is more secure?

ADSelfService Plus | March 23, 2026

2FA vs. MFA: What’s the difference and which is more secure?

In modern enterprise environments, compromised credentials remain one of the top causes of...

What is segregation of duties, and why is it so important for compliance?

ADManager Plus | March 19, 2026

What is segregation of duties, and why is it so important for compliance?

Segregation of duties (SoD), also called separation of duties, is a concept which states...

Securing the gateway: Why SSH 2FA is essential

ADSelfService Plus | March 18, 2026

Securing the gateway: Why SSH 2FA is essential

In an era where remote work is the widely adopted and cloud infrastructure is crucial to...

What is a replay attack, and how do you avoid falling victim?

ADSelfService Plus | March 13, 2026

What is a replay attack, and how do you avoid falling victim?

In today’s interconnected world, cyberthreats are constantly evolving. Among these threats...

Privileged accounts: What are they and how do you manage them?

ADManager Plus | March 12, 2026

Privileged accounts: What are they and how do you manage them?

Privileged accounts are identities that have elevated permissions beyond standard user...

Page 1 of 54123...»Last »