IAM Comparison: How to Choose the Best Solution!

By |2022-09-14T09:14:10+02:0018 / 07 / 2022|IAM|

Identity & access management solutions allow organizations to control user accounts and their permissions safely, efficiently and in accordance with legal requirements as well as industry standards. Once a company grows too large to rely on manual access management, IAM tools are a key investment for protecting sensitive data while ensuring seamless access for [...]

What Is IAM? Identity & Access Management Explained

By |2022-07-19T10:14:07+02:0018 / 07 / 2022|IAM|

Identity & access management or IAM is a discipline of cybersecurity that deals with the question of who can access what information in a business or similar organization. Automated IAM solutions provide safe and appropriate access to members of staff, while preventing unauthorized access from both within and without. Read our complete guide to [...]

Privilege Creep: How to Deal With Excess Permissions

By |2022-09-23T09:48:41+02:0005 / 05 / 2022|IAM|

Privilege creep refers to the gradual build-up of unnecessary permissions in IT systems. Many companies struggle with privilege creep due to missing safeguards such as user access reviews. As a result, permissions stay active long past their intended use. Privilege creep often goes unnoticed at first. However, the build-up of permissions increases the risk [...]

RBAC: Role-Based Access Control Explained!

By |2022-07-19T10:15:06+02:0018 / 02 / 2022|IAM|

Role-Based Access Control (RBAC) is an approach to access management based on bundling IT privileges to make it easier to control them. Combining the permissions users need to adequately perform their job duties into roles makes it easier to manage access to data and resources for those users. Read on to learn more about the [...]

How to Set an Outlook Out of Office Message for Another User

By |2022-07-19T10:17:07+02:0021 / 07 / 2021|IAM|

"Thank you for your email! Unfortunately, I am out of the office until August 1." Out of office or OOF messages like these are a key part of office culture. Setting up an automatic email response before you go on vacation or take your parental leave helps keep colleagues and clients informed of your [...]

Identity Management vs. Access Management – What’s the Difference?

By |2022-07-19T10:20:35+02:0002 / 10 / 2020|IAM|

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights [...]

Access Management for Microsoft and Other Systems

By |2022-07-19T10:41:13+02:0002 / 10 / 2020|IAM|

Why do we need access management? The answer is simple: Every company holds various types of information, from confidential to secret to top secret. Thanks to the GDPR (General Data Protection Regulation), companies are now no longer merely advised to protect their sensitive data, they are required to do so by law. The question [...]

User Access Review: How to Keep Privileges In Check

By |2022-07-19T10:19:56+02:0030 / 09 / 2020|IAM|

Users come and go, they are assigned to new projects or switch to different departments. And at every step of the way, they collect new privileges. That’s OK, they need certain privileges to do their jobs. But do they really need all of their current privileges? What about permissions from their previous position, or [...]

Why Does tenfold Not Offer a “Comfort Feature”?

By |2021-05-06T15:16:54+02:0025 / 03 / 2020|IAM|

A competitive product to tenfold offers a “comfort feature”. With this feature, users can not only be given access to file servers via group memberships, but also directly. The feature is advertised with the advantage that the user can use the new permissions immediately without having to log in again. On a technical level, [...]

3 Ways to Prevent Outdated Access Rights

By |2022-07-19T10:22:01+02:0015 / 10 / 2019|IAM|

Most organizations have clear guidelines and rules for assigning access rights. However, more often than not they do not have structured processes for removing these access rights when they are no longer needed. Without such workflows in place, every department change, resignation or allocation of special rights leads to more chaos. Without professional user [...]

Go to Top