Blog2019-01-07T10:45:52+00:00

tenfold Blog

1707, 2018

List Rights and Access-Based Enumeration

By |17 / 07 / 2018|BLOG|

List Rights and Access-Based Enumeration - A perfect team Life Before ABE Permissions on file servers are necessary because we can use them to control which users have access to which data. [...]

606, 2017

User management faces increasing challenges

By |06 / 06 / 2017|BLOG|

User management faces increasing challenges The faster an IT landscape grows, the harder it becomes to keep track of users (user management). The question this posed to IT managers and administrators is: [...]

1507, 2016

One more reason to use tenfold

By |15 / 07 / 2016|BLOG|

One more reason to use tenfold The new tenfold Essentials PLUS edition rounds off the scope of offers its preceding sister products, “Essentials Edition“ and “Enterprise Edition“, provide. Besides adopting Active Directory® [...]

1503, 2016

tenfold meets Service Management

By |15 / 03 / 2016|BLOG|

tenfold meets Service Management Different scenarios Besides tenfold, our customers often choose to use different service management solutions for identity and access management (IAM) purposes. Mostly, these solutions are used to map [...]

2710, 2015

Reference users: a risk to IT security

By |27 / 10 / 2015|BLOG|

Reference users: a risk to IT security Common practice Duplicating users into so called “reference users“ when managing user permissions (identity & access management), has become common practice – much to the [...]