About Nele Nikolaisen

Nele Nikolaisen is content manager at tenfold. She is also a book lover, cineaste and passionate collector of curiosities.

TISAX Certification – Requirements, Levels & Costs

By |2021-09-13T17:22:00+02:0004 / 08 / 2021|Data Privacy|

Faster, better, and ultra-high-tech: The automotive industry is booming. To guarantee high standards throughout the planning and manufacturing process, manufacturers work very closely with their suppliers, often involving them directly in product development processes. To do so, however, they have to pass on highly sensitive data. But the loss or misuse of this information [...]

File Server Migration: Get Your File Server Back in Shape Now!

By |2021-09-16T13:58:03+02:0007 / 07 / 2021|Active Directory|

Microsoft® Windows is to IT departments like air is to humans. Well, maybe not quite as dramatic, but you really couldn’t imagine one without the other. And using Windows inevitably means you’ll be dealing with permissions, too – and lots of them! Permissions in the Active Directory, permissions on file servers and permissions on [...]

Secure Password Transmission With tenfold

By |2021-07-08T15:31:55+02:0021 / 06 / 2021|tenfold News|

When you create a new user account in Active Directory, SAP or any other system, you have to set an initial password for the account. If you’re using tenfold to cover this process, the software generates a random password that complies with the password policies of the system you are creating the account for. [...]

Active Directory Permission Management Explained

By |2021-08-10T15:06:16+02:0016 / 06 / 2021|Active Directory|

Microsoft® Windows is to IT departments like yin is to yang, like whiskey to coke, like grass is to sheep. It’s a symbiosis and the existence of one without the other is almost unimaginable. But being joined at the hip doesn’t automatically make the relationship a healthy one – and the widespread use of [...]

IAM Software Solutions Compared

By |2021-09-17T14:05:11+02:0004 / 05 / 2021|IAM|

Identity and access management (IAM) systems allow organizations to manage identities and access rights for different systems and programs through one central platform. The two most dominant product categories of IAM software are data governance solutions and more complex enterprise IAM solutions. In this article, we are going to compare both options and examine [...]

Azure Active Directory: What Is Azure AD?

By |2021-03-31T11:35:44+02:0031 / 03 / 2021|Cloud|

Microsoft 365, Azure AD, Cloud IAM – there's a lot going on in the Microsoft universe at the moment. And to some, the imminent move to the cloud is a cause for uncertainty: can Azure AD really deliver the same functionalities as the on-prem Active Directory? The short answer is: no. While Azure Active [...]

Modify Plus: Secure NTFS Permission Endpoints

By |2021-01-22T15:56:14+01:0022 / 01 / 2021|Active Directory|

To grant users access to files and folders on Windows drives, admins can use either share permissions or NTFS permissions. NTFS (New Technology File System) is the more common method, though, as it allows a more granular approach to granting permissions. Read on to learn how to use the “Modify Plus“ option to further [...]

Principle of Least Privilege: Access Management and Data Protection

By |2021-09-17T14:08:49+02:0012 / 01 / 2021|Data Privacy|

The principle of least privilege, also referred to as least privilege principle, or POLP for short, is considered best practice in the field of cyber security. When used correctly and consistently, POLP ensures that individual users only have the privileges they actually need to carry out their job duties. In this article, we are going [...]

SAP and AD: Make the Connection With Access Management

By |2020-12-13T10:53:19+01:0003 / 12 / 2020|Active Directory|

Corporations and organizations of a certain size usually rely on some form of ERP software to optimize their business processes. The undisputed market leader in this field is the German company SAP, which currently provides over 100 solutions for various business areas. Several companies even have multiple SAP systems running concurrently. SAP is an [...]

Protect Yourself Against Data Theft From Within

By |2020-12-15T12:45:09+01:0030 / 11 / 2020|Data Privacy|

Ask a group of IT officers who the real enemy of cybersecurity is and they’ll call out in unison: Trojans! Phishing mails! Hackers! Are you nodding in agreement? While indeed these threats are real and need to be addressed, there is another menace that people, including experts, tend to forget about [...]

Go to Top