- Upvotes Received
- 2
- Posts with Upvotes
- 1
- Upvoting Members
- 2
- Downvotes Received
- 1
- Posts with Downvotes
- 1
- Downvoting Members
- 1
What’s the worst that could happen if someone’s account credentials within your organisation fell into a hacker’s hands? |
|
According to Microsoft, 75% of organizations with more than 500 employees, have extended AD into either Azure AD and/or Office365. Have you / or are you planning to extend Active Directory into either Azure AD or Office 365 or for any other purposes? |
|
Many organisations have systems, applications or services that don’t currently make use of Active Directory but use other sources of information for access control such as mainframes, SaaS, specialized applications, infrastructures or databases. Have you, or are you planning to, extend Active Directory to other systems, applications or services such … |
|
Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security? |
|
As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this? |
|
We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used … |
|
Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using … |