• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog / Identity and access management

What is segregation of duties, and why is it so important for compliance?

ADManager Plus | March 19, 2026

What is segregation of duties, and why is it so important for compliance?

Segregation of duties (SoD), also called separation of duties, is a concept which states...

Securing the gateway: Why SSH 2FA is essential

ADSelfService Plus | March 18, 2026

Securing the gateway: Why SSH 2FA is essential

In an era where remote work is the widely adopted and cloud infrastructure is crucial to...

What is a replay attack, and how do you avoid falling victim?

ADSelfService Plus | March 13, 2026

What is a replay attack, and how do you avoid falling victim?

In today’s interconnected world, cyberthreats are constantly evolving. Among these threats...

Privileged accounts: What are they and how do you manage them?

ADManager Plus | March 12, 2026

Privileged accounts: What are they and how do you manage them?

Privileged accounts are identities that have elevated permissions beyond standard user...

What is zero-factor authentication?

ADSelfService Plus | March 2, 2026

What is zero-factor authentication?

Zero-factor authentication represents the next evolution of passwordless security. It...

What birthright access is and how to use it to enforce least privilege

ADManager Plus | February 17, 2026

What birthright access is and how to use it to enforce least privilege

Birthright access refers to the predefined, minimum set of access rights a user should...

What is access rights management, and how is it different from access control?

ADManager Plus | February 11, 2026

What is access rights management, and how is it different from access control?

Access rights management (ARM) is the overarching governance and administrative discipline...

What is access control? Understanding access control components, types, and implementation

ADManager Plus | February 6, 2026

What is access control? Understanding access control components, types, and implementation

Access control is the fundamental security mechanism used to control who can access...

 ManageEngine in The Workforce Identity Security Platforms Landscape

AD360 | February 2, 2026

ManageEngine in The Workforce Identity Security Platforms Landscape

In the Workforce Identity Security Platforms Landscape, Q4 2025, Forrester named...

What is role-based access control?

ADManager Plus | January 30, 2026

What is role-based access control?

Role-based access control (RBAC) is a method for controlling access to resources based on...

Delegate domain join permissions in Active Directory

ADManager Plus | January 23, 2026

Delegate domain join permissions in Active Directory

Delegating permissions to join a computer to a domain might sound simple, but under the...

SSO vs. MFA: Understanding the difference

ADSelfService Plus | January 23, 2026

SSO vs. MFA: Understanding the difference

Identity security conversations often circle around single sign-on (SSO) vs. multi-factor...

Page 1 of 54123...»Last »