About Helmut Semmelmayer

Helmut Semmelmayer currently heads channel sales at the software company tenfold software. He looks back on 10 years of involvement in the identity and access management market. Having worked on countless customer projects, he has extensive knowledge of the challenges that organizations face when it comes to protecting data from unauthorized access. His goal is to educate businesses and build awareness for current and future access-based attack patterns.

Is it possible to license tenfold only for parts of the Active Directory?

By |2021-07-26T14:02:11+02:0024 / 04 / 2020|Active Directory|

EULA Regulations The tenfold End User License Agreement (EULA) stipulates that all physical, active IT users who are to be managed via tenfold must be licensed. Strictly speaking, this licensing policy applies independently of Active Directory, even though, in most cases, licensing is based on Active Directory since it is used to manage all [...]

Why Does tenfold Not Offer a “Comfort Feature”?

By |2021-05-06T15:16:54+02:0025 / 03 / 2020|IAM|

A competitive product to tenfold offers a “comfort feature”. With this feature, users can not only be given access to file servers via group memberships, but also directly. The feature is advertised with the advantage that the user can use the new permissions immediately without having to log in again. On a technical level, [...]

Application Security: How It Works

By |2021-04-14T15:06:11+02:0020 / 11 / 2019|Data Privacy|

Are your internal drives protected against data theft? Yes? Awesome! But what about customer data, sales figures and other sensitive information that is accessible via CRM and ERP systems? In this article, we are going to examine why application security is a crucial component of any effective cybersecurity concept and how access management software [...]

3 Ways to Prevent Outdated Access Rights

By |2021-05-06T12:02:31+02:0015 / 10 / 2019|IAM|

Most organizations have clear guidelines and rules for assigning access rights. However, more often than not they do not have structured processes for removing these access rights when they are no longer needed. Without such workflows in place, every department change, resignation or allocation of special rights leads to more chaos. Without professional user [...]

Insider Threat: What Is it & How Can It Be Stopped?

By |2020-12-23T14:46:52+01:0010 / 10 / 2019|Data Privacy|

Did you know that the term insider threat encompasses more than just your typical thieving employee? An inside threat could be a business associate, a former employee or anyone else who has managed to gain inside access despite security measures. In this article, we are going to examine the most common cyber threats found [...]

tenfold at it-sa 2019 – Secure Your Free Ticket Now!

By |2020-09-28T14:11:50+02:0019 / 08 / 2019|tenfold News|

Europe’s largest IT security fair, the it-sa in Nuremberg, will take place from October 8th – 10th, 2019. It is one of the world’s most recognized platforms for cloud, mobile and cyber security, as well as for data and network security. Since 2009, the it-sa in Nuremberg has been the number one meeting place [...]

Data Stolen: € 460,000 Fine for Hospital in The Hague

By |2020-11-20T16:49:23+01:0006 / 08 / 2019|Data Privacy|

A hospital in The Hague was fined € 460,000 for violating the GDPR (General Data Protection Regulation). According to the Dutch supervisory authority Autoriteit Persoonsgegevens, the offence occurred back in 2018. Hospital Staff Gained Access to Data of Prominent Patient The incident occurred while famous reality TV star Samantha de Jong was [...]

Desjardins Bank: Data of 2.9 Million Customers Stolen

By |2021-07-02T12:29:53+02:0009 / 07 / 2019|Data Privacy|

The Canadian cooperative bank Desjardins and local authorities are currently dealing with a particularly hefty case of data abuse: A bank employee - who has since been dismissed - managed to steal the personal data of roughly 2.9 million customers. About 40% of Desjardins' customers have been affected by the incident. Today, we are [...]

tenfold Import Feature – Integrate Existing Structures

By |2021-04-12T13:36:11+02:0003 / 06 / 2019|Active Directory|

Organizations who decide to implement access management software commonly ask themselves: what to do with existing infrastructures? What can we do with file server groups that were established as part of a painstaking manual process that took forever? With tenfold, your efforts will not have been in vain because you can simply import these [...]

Access Management: The Risks Explained

By |2021-06-28T15:48:37+02:0029 / 04 / 2019|IAM|

Most organizations have experienced this scenario first-hand: a compliance audit is imminent and suddenly IT staff scramble to find out who has access to what data, who granted it and why. And on top of that, they have to prove to auditors that those privileges were subject to regular reviews. It’s a bit of [...]

Go to Top