Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What are the criteria for a strong authentication system?

    In this Q&A, identity management and access control expert, Joel Dubin examines what components are necessary to create any secure authentication system. 

  • Risk-based authentication vs. static authentication

    How does risk-based authentication methods differ from static authentication methods? SearchSecurity's resident identity management and access control expert tackles this question in this Ask the Expert Q&A. 

  • How to clean up dormant accounts in Active Directory

    Inactive or dormant Active Directory accounts can serve as a gateway for attackers. Learn how to identify and clean up inactive Active Directory accounts in this Identity Management and Access Control Ask the Expert Q&A. 

  • How to manage user permissions

    Managing multiple user permissions can be a daunting task. Learn best practices for managing these permissions including servicing account passwords, granting local admin access, permissions for files and shares and other access related requests, in ... 

  • Can a non-administrator change the local administrator password on 50 workstations?

    In this network security Ask the Expert Q&A our resident expert discusses if it's possible to use the login script to change the local admin password. 

  • Password authentication resources

    Learn where you can find literature regarding the need for stronger password authentication, in this Ask the Expert Q&A. 

  • How to distribute and monitor rights and permissions

    Learn how permissions and rights should be distributed and monitored in an organization in this security management Ask the Expert Q&A. 

  • Changing user IDs and passwords

    Learn why organizations should limit the number of username changes in this identity and access management ATE Q&A. 

  • How to build a user registration form

    Learn how to build a secure user registration form and some general Web-based system guidelines to guide you through the process. 

  • Best practices for password protection

    Learn what a keyring is -- how it works in conjuction with passphrases to keep sensitive and personal messages secure. Also learn what practices help keep passwords protected from hackers and crackers.