Active Directory and LDAP Security News
July 15, 2014
Despite what may be a dangerous new Active Directory "pass the hash" attack variant, Microsoft has downplayed the issue as a technical limitation.
October 25, 2013
The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.
February 08, 2008
Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity.
December 12, 2007
Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain.
Active Directory and LDAP Security Get Started
Bring yourself up to speed with our introductory content
Video: A Radiant Logic executive explains how virtual directory services ease the pain of integrating legacy Active Directory and identity systems with cloud-based applications and user-owned devices. Continue Reading
This Beyond the Page examines how some enterprises are protecting their big-data ecosystems with encryption, security data analysis and visualization. Continue Reading
How Aorato's Directory Services Application Firewall protects Active Directory, and why it's useful for enterprises. Continue Reading
Evaluate Active Directory and LDAP Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Randall Gamby discusses how OpenLDAP should (or shouldn't) be used in conjunction with enterprise directory implementations. Continue Reading
Manual compliance processes are error-prone and drain corporate IT resources. Automated tools make a difference if you apply them to a well-organized compliance program. Continue Reading
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance. Continue Reading
Product ReviewsPowered by IT Central Station
Enables us to sell products which creates significant revenue but their disaster recovery needs improvementPowered by IT Central Station
Valuable Features: The Registration/Login Management and Single Sign On tools are extremely valuable for us. They have allowed us to migrate a...Continue Reading
The UI for requesting and approving rights has been outdated, but in the latest version that has been addressedPowered by IT Central Station
Valuable Features: Event driven provisioning and powerful Development and documentation tool - Designer are the most valuable features on NetIQ...Continue Reading
Powered by IT Central Station
Valuable Features: Risk Analysis Engine Business-IT Role Mining, Certifications Dynamic Grouping Life Cycle Management Provisioning Integration...Continue Reading
Manage Active Directory and LDAP Security
Learn to apply best practices and optimize your operations.
Many Hadoop variants offer fully integrated Kerberos, with facilities to improve setup and link to your existing identity repository. Continue Reading
Misplaced or stagnant employee access can be dangerous; Randall Gamby details user provisioning best practices for setting up a system to combat this risk. Continue Reading
Problem Solve Active Directory and LDAP Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Is IMEI authentication a secure choice when considering a mobile authenticator? Randall Gamby explains why it may not be a wise choice. Continue Reading
Learn the benefits of role-based access control based on job functions of network accessing employees, and how to make an RBAC implementation easier. Continue Reading
User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification ... Continue Reading