Everything about IT Security

avatar photo
Tuesday, May 13, 2025 / Published in Best practices, Compliance, Safety
Active Directory (AD) is the backbone of your IT infrastructure. It manages identities, permissions, and policies for users, computers, and services. A well-maintained AD is crucial for your company's security, efficiency, and compliance. However, in reality, AD structures often develop into complex, confusing structures over the years.
avatar photo
Friday, May 09 2025 / Published in Efficiency, Safety
Data is growing faster than many companies can imagine. But when does this growth become a real problem? How can companies design their IT infrastructure to keep pace with the exponential increase in data? The answer lies in a clearly structured data usage concept (DNK). In this article, we will show you how
avatar photo
Monday, April 07, 2025 / Published in Safety, VIDEO, Webinar
Active Directory is the heart of many IT infrastructures – yet in many companies, the structures that have evolved resemble a "digital spaghetti plate" rather than a properly maintained directory. The webinar focused on typical challenges in managing groups, permissions, and responsibilities. The consequences are security risks, inefficient administrative processes, and a lack of overview. In the product webinar on April 1, 2025
avatar photo
Tuesday 01 April 2025 / Published in Practice, Safety
The question is not if, but when your company will become the target of cyberattacks and internal security threats. Yet, very few companies are prepared for this emergency. Many companies struggle with confusing authorization structures, outdated group memberships, and a lack of transparency. This not only leads to security gaps, but can also cause compliance problems. This is where the principle of
avatar photo
Friday, February 28, 2025 / Published in Data Management, Safety
Labeled wooden blocks DATABREACH
How to ensure the security of your Active Directory. Active Directory (AD) is an often underestimated, yet extremely critical component of the IT infrastructure. In many companies, it has grown, expanded, and adapted over the years – becoming increasingly complex and confusing. What at first glance appears to be a purely technical problem is, in fact, a
avatar photo
Wednesday 26 February 2025 / Published in Safety, VIDEO
The webinar on February 25, 2025, offered valuable insights into the challenges and solutions surrounding IT security in Active Directory (AD) and on file servers. Hosted by Jan Engelmann and Thomas Erlbacher, they shared their experience and presented practical analyses and optimization strategies. These are the contents of the webinar on February 25.02.2025, XNUMX: Risks and Challenges in AD and
avatar photo
Friday, February 14, 2025 / Published in Safety, VIDEO
The webinar on February 11, 2025, offered valuable insights into the challenges and solutions surrounding authorization and data management in companies. Hosted by CEO Thomas Gomell, who drew on his many years of experience to present practical solutions. The webinar on February 14, 2025, covered the following topics: Data structures and authorization management The importance of flat structures Strategies for optimization
avatar photo
Thursday, February 13, 2025 / Published in Best practices, Safety
How should you manage permissions on Microsoft file systems? A question that comes up again and again. Actually simple but highly controversial. We clarify.
avatar photo
Thursday, 28 November 2024 / Published in Data Management, Safety, Uncategorized
Recognize and eliminate the dangers of unchecked data growth. The question is not if, but when your company will become the target of a cyber attack. Despite this, many companies are inadequately prepared for the worst-case scenario. A major gateway is confusing authorization structures as a result of constantly growing data volumes. Security gaps such as orphaned employee accounts, incorrect and excessive authorizations outside of the "least privilege" principle also remain in confusing