About Joe Köller

As a content manager at tenfold, Joe Köller dives deep into topics like compliance, IT security and access management. His interests also include digital media, American literature and gardening.

ISO 27001 Compliance Requirements & Checklist

By |2022-07-01T20:25:08+02:0001 / 07 / 2022|Compliance|

ISO 27001 is among the most well-known and commonly used cybersecurity standards in the world. Organizations who implement and certify an ISO-compliant information security management system (ISMS) demonstrate that they are maintaining an excellent level of cybersecurity. In this article, we are going to outline the ISO 27001 compliance requirements and discuss what organizations and [...]

Sophisticated IAM Solution for Midsize Businesses: KuppingerCole Analyzes tenfold Access Management

By |2022-06-03T12:08:18+02:0003 / 06 / 2022|tenfold News|

KuppingerCole Analysts, a global leader in the IT security and digital identity sector, gives organizations an independent perspective on the identity and access management market. Besides providing general market analyses, KC’s team of experts also review individual IAM products in detail. tenfold Access Management recently stood up to the test performed [...]

Microsoft Teams: Where to Find Shared Files

By |2022-06-21T10:26:55+02:0013 / 05 / 2022|Cloud|

Cloud-based tools like Microsoft Teams have truly revolutionized modern office life: a few clicks is all it takes to share the latest memo or presentation with everyone on your team. But what if you end up looking for that same document a month down the line? Or end up needing that spreadsheet half a [...]

Privilege Creep: How to Deal With Excess Permissions

By |2022-05-13T12:45:58+02:0005 / 05 / 2022|IAM|

Privilege creep refers to the gradual build-up of unnecessary permissions in IT systems. Many companies struggle with privilege creep due to missing safeguards such as user access reviews. As a result, permissions stay active long past their intended use. Privilege creep often goes unnoticed at first. However, the build-up of permissions increases the risk [...]

tenfold 2022 R1: Update to IAM Solution Expands Support for Microsoft 365®

By |2022-04-05T12:46:22+02:0005 / 04 / 2022|tenfold News|

tenfold Software announces the release of the newest version of their IAM solution. 2022 R1 expands tenfold’s existing Microsoft 365 support, which allows customers to manage local networks and cloud services through one automated platform. Thanks to new plugins for Teams and SharePoint Online, users are now also able to track and manage access [...]

SharePoint, OneDrive or Teams: How to Share Files in Microsoft 365

By |2022-06-21T10:24:11+02:0023 / 03 / 2022|Cloud|

With all the apps and services included in Microsoft 365, it's easy to lose track of all your options or wonder which tool is the best choice for which job. Especially when it comes to sharing files with your coworkers, the Microsoft Cloud gives you a lot of ways to achieve the same result. [...]

Zero Trust Security Explained: The New Access Control Paradigm

By |2022-06-21T11:16:27+02:0015 / 02 / 2022|Data Privacy|

In the world of IT security, trust is a luxury you can no longer afford. To protect against the growing frequency and sophistication of cyberattacks, even users and devices within your own network can no longer be trusted implicitly, but have to verify their identity on an ongoing basis. This approach, more commonly known [...]

5 minutes with… tenfold security’s Helmut Semmelmayer

By |2021-10-12T11:34:10+02:0012 / 10 / 2021|tenfold News|

Helmut Semmelmayer currently heads channel sales at the software company tenfold software. Having worked on countless customer projects, he has extensive knowledge of the challenges that organizations face when it comes to protecting data from unauthorized access. His goal is to educate businesses and build awareness for current and future access-based attack patterns… [...]

US Cybersecurity Safe Harbor Laws by State: All Current Legislation

By |2022-02-24T14:53:20+01:0004 / 10 / 2021|Compliance|

Getting hit by a cyberattack is a nightmare scenario for any company. Businesses not only have to deal with lost productivity and the cost of IT repairs, but could also be on the hook for fines and legal damages if any sensitive data was exposed as a result of the breach. Given this incredibly [...]

TPISR – Third-Party Cybersecurity In the Automotive Industry

By |2022-02-24T14:51:07+01:0009 / 09 / 2021|Compliance|

From high-performance mechanical parts to digital assistance and safety features, modern cars come equipped with an ever growing number of technological innovations. To help auto manufacturers protect design specifications and other sensitive information even as they work with third party suppliers, the Automotive Industry Action Group (AIAG) developed the Third-Party Information Security Requirements (TPISR): [...]

Go to Top