[RESOURCES]

Explore the latest practical advice to boost your organization’s security

[Must Read]

SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY

In a previous blog post, we discussed taking advantage of Azure Active Directory (AD) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. READ MORE

Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.
Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.

[EXPLORE RESOURCES]

[FROM THE BLOG]

In Part 3 of this blog series, we discuss some other important considerations when taking this approach to automation. [...]
Part 2 of this blog series gets into the details of how to create and configure an app registration for use with an automated PowerShell script. [...]
Automation is a fundamental requirement for good systems administration, no matter what the platform. Being able to automate tasks ensures consistency and prevents mistakes caused by forgetfulness or by simply [...]
Several high-risk events have recently highlighted the importance of a fully functional and secure Active Directory environment to a company’s business operations. [...]
Migrating your Active Directory Federation Services (AD FS) integrated SaaS applications to Azure Active Directory (Azure AD) provides many benefits. For example, Azure AD B2B lets you give your business [...]
Do you know how to protect organizational data on mobile devices without affecting personal data? Are you aware of the policies required to implement a strong foundation for protecting your [...]
One of the most important security controls in an Active Directory (AD) forest is the prevention of privilege escalation paths. The tiered access model for AD introduces a significant number [...]
The workstation an administrator uses to perform privileged tasks such as managing Active Directory (AD) is a high-value target for a potential adversary. By providing administrators with a clean keyboard, [...]