Posts
 
Reputation
Joined
Last Seen
0 Reputation Points
70% Quality Score
Upvotes Received
2
Posts with Upvotes
1
Upvoting Members
2
Downvotes Received
1
Posts with Downvotes
1
Downvoting Members
1
0 Endorsements
~2K People Reached
Favorite Tags
Member Avatar for Sammy_3

What’s the worst that could happen if someone’s account credentials within your organisation fell into a hacker’s hands?

Member Avatar for Josh Ross
0
436
Member Avatar for Sammy_3

According to Microsoft, 75% of organizations with more than 500 employees, have extended AD into either Azure AD and/or Office365. Have you / or are you planning to extend Active Directory into either Azure AD or Office 365 or for any other purposes?

Member Avatar for Reverend Jim
0
199
Member Avatar for Sammy_3

Many organisations have systems, applications or services that don’t currently make use of Active Directory but use other sources of information for access control such as mainframes, SaaS, specialized applications, infrastructures or databases. Have you, or are you planning to, extend Active Directory to other systems, applications or services such …

Member Avatar for rproffitt
0
198
Member Avatar for Sammy_3

Looking for 'top tips' or pieces of advice you would give to someone newly responsible for an organization’s access management security?

Member Avatar for rproffitt
0
289
Member Avatar for Sammy_3

As alternatives to technology, organisations can write custom scripts or programs to work around shortcomings of native tools, or to automate and assist Active Directory 4 management. Do you use custom scripts or programs to work around shortcomings of native Active Directory? Do you see any risks associated with this?

Member Avatar for Reverend Jim
0
126
Member Avatar for Sammy_3

We all know that identity and access management (IAM) tools from third parties can help secure access with Active Directory. However, problems in Active Directory IAM tools can have an impact on the operation or security of the overall AD environment. Identity governance and administration (IGA) tools are often used …

Member Avatar for rproffitt
0
297
Member Avatar for Sammy_3

Hi there, I’m doing some research around cybersecurity — specifically access management. Does anyone have a moment to answer the below please? 1. Since Windows Active Directory is nearly ubiquitous in enterprises, what are IT professionals doing to secure access? What are the biggest challenges to securing user access using …

Member Avatar for happygeek
1
356