User Management

By controlling who can access what portions of the network whole, IT admins use user management to improve security, among many other facets of IT. This was usually done via directory services, such as Active Directory, but with the rise of the cloud, user management is tough with just AD.

IDENTITY AND ACCESS MANAGEMENT (IAM)

What Are the Different Types of Access Control?

Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.

IDENTITY AND ACCESS MANAGEMENT (IAM)

What Is Shadow IT?

Get the definition of shadow IT, examples of common instances of shadow IT, its effects on an organization, and how to identify and prevent it.