Helmut Semmelmayer

About Helmut Semmelmayer

Helmut Semmelmayer has been Senior Manager Channel Sales at the software company tenfold since 2012. He is in charge of partner sales and product marketing and regularly blogs about issues and topics related to identity and access management.

NTFS Permissions and Share Permissions – What’s the difference?

By |2019-04-18T10:30:55+00:0018 / 04 / 2019|BLOG|

What are NTFS permissions? NTFS permissions govern access to files and directories on Windows drives. These permissions apply regardless of whether the files are accessed locally from a computer or using a share via the network. NTFS permissions can be set by right-clicking on a folder and selecting “Properties“ from the menu. Navigate to [...]

Hacking MFA & Privilege Escalation: From Helpdesk Agent to Domain Admin in only 3 Minutes

By |2019-03-19T11:41:47+00:0019 / 02 / 2019|BLOG, BLOG|

MFA Basics MFA (Multi-Factor-Authentication) requires not just one factor (e.g. a password) but two - or even several - factors for user authentication. Common examples are OTP (One Time Passwords) generated by a token, or smart cards. Generally, we speak of authentication in two forms: Password: Something I know Smart card / token: Something [...]

Re-certification – bringing structure to your access landscape

By |2019-02-19T14:03:32+00:0019 / 02 / 2019|BLOG, BLOG|

While most companies have structured processes for assigning access rights in place, they tend to neglect the removal of rights that have become obsolete. We therefore often come across organizations with a chaotic access landscape: Access rights, once carefully selected and assigned, become autonomous over time. Employees switching departments, resigning or receiving special rights [...]

Leaked: Names of 14.000 HIV patients published online. Number of data leaks in the healthcare sector is rising

By |2019-02-11T12:38:42+00:0031 / 01 / 2019|BLOG|

In Singapore, the names (and other personal data) of more than 14,000 people infected with HIV were published online as a result of a data leak. Among those affected are also more than 8,800 foreign patients. The data were stolen and put online by a US citizen. The man obtained the documents secretly through [...]

Incorrect permission management: 400.000 Euro fine for GDPR violation in Portugal

By |2019-01-24T12:08:42+00:0014 / 01 / 2019|BLOG|

Barreiro Montijo hospital in Portugal is facing a huge fine for violating the General Data Protection Regulation. The local data protection authority, CNPD, has imposed the first significant fine of € 400,000. Unauthorized access to personal data The hospital allowed technicians to view sensitive patient data in the IT system that should only have [...]

The VPN Connection That Was Forgotten

By |2019-02-21T15:52:13+00:0007 / 01 / 2019|BLOG, BLOG|

It all began with a common procedure Jerry works for the development department in a medium-sized company. For personal reasons, he has to work from home for a few weeks – something the company normally does not allow. However, since Jerry has been a long-standing and reliable part of the team, the company [...]

Using HR Data to Prevent Unauthorized IT Access

By |2019-01-07T10:46:51+00:0007 / 01 / 2019|BLOG, BLOG|

How does it work One topic that keeps recurring among customers during Identity Management projects with tenfold (especially companies with more than 500 IT users) is the wish to be able to transfer user data automatically from HR databases (SAP HCM etc.) into tenfold – i.e. not having to enter persons manually into [...]

Permission management: Why integration is the key to success

By |2019-01-24T13:36:30+00:0004 / 10 / 2018|BLOG|

What is the law? The recent new European GDPR has prompted many businesses to move forward in the field of IT security. There has been a downright boost of innovation. One topic that is prevalent among the numerous measures that need to be taken, is user and permission management. Access control is [...]

Four aspects to consider when choosing a permission management software

By |2019-01-31T14:27:44+00:0007 / 06 / 2018|BLOG|

IT systems A permissions management software must be able to incorporate all significant IT systems, e.g. core systems, like Active Directory, and systems that build on it and require some form of permission management, like approvals (network sharing), Exchange, SharePoint, Citrix. For many applications, users and permissions are administered in an extra user database. [...]

EU-GDPR: start managing your permissions properly now

By |2018-10-02T11:38:35+00:0023 / 11 / 2017|BLOG|

GDPR: start managing your permissions properly now What ist the EU-GDPR? The European Union‘s General Data Protection Regulation comes into force on May 25th, 2018. Its purpose is to regulate personal data protection of EU citizens. Once the GDPR is in force, it will be mandatory for all companies that process any [...]