+49 30 3642803 0 | info@permsecure.com
Knowledge & Whitepapers
Welcome to our blog. Find everything you need to know about Active Directory, file servers, and IAM.
-
Whitepaper – Identity & Access Management – With Milesstones to Success
This whitepaper explains the introduction of identity & access management systems. In particular, the various topics relating to people, resources and their interaction are examined and explained in more detail. The individual phases in the implementation of an IAM system are described and the various…
-
Whitepaper – Identity & Access Management Software: Anbieter & Vergleich
Für viele Unternehmen nimmt die Bedeutung der Einführung eines Identity & Access Management Systems immer mehr zu. Unternehmen gelangen oftmals zu dem Schluss, dass sie ihre Benutzer- und Zugriffsberechtigungen optimieren müssen, um wieder mehr Übersicht zu erlangen, die Prozesse zu schärfen, ihre IT zu…
-
Whitepaper – Data Owner
In this whitepaper, we look at the role of a data owner in the context of a company. It explains the tasks of the data owner and the relevance of user and permission management. In addition, the document explains the importance of good interaction…
-
Windows File Shares Configuration – Best Practice
In order to exchange data in companies, various file shares are repeatedly created by IT and published for the users. In the following article, we explain how to create file shares, provide information on the special features that need to be taken into account,…
-
Whitepaper – Identity & Access Management in der BSI-Kritisverordnung
Als Kritische Infrastrukturen (KRITIS) bezeichnet das Bundesministerium des Inneren (BMI) jene Organisationen und Einrichtungen, deren ernsthafte Beeinträchtigung oder Ausfall dramatische Folgen für das staatliche Gemeinwohl hätten (z.B. Versorgungsengpässe und Störungen der öffentlichen Sicherheit). Die BSI-Kritisverordnung beschreibt die einzelnen Sektoren und die Schwellenwerte, die darüber entscheiden, ob es sich bei einer Einrichtung um eine Kritische Infrastruktur…
-
Active Directory: Users locked or disabled – What is the Difference?
There are different states for Active Directory user objects. For example, one distinguishes between activated, locked or deactivated accounts. Often the question arises, what is actually the difference between a locked and a deactivated AD user account. In this article, we will go into the individual states of…
-
Modify Permissions – Protect Permission Endpoints in NTFS using Modify Plus
In Microsoft Windows networks, permissions on the file server can be assigned either via share permissions or NTFS permissions. A combination of both types of permissions is also possible. However, NTFS permissions are predominantly used, since access can be controlled more granularly. As a rule,…
-
Whitepaper – NTFS Best Practice
This whitepaper explains the NTFS file system in more detail and is intended to share NTFS best practices. The main focus is on permission management in Microsoft environments and the effective administration of NTFS permissions. The document explains the different types of permissions and…
-
Dark Data – About the Data Load and how to face it
In our customer projects, we repeatedly experience a wide variety of file storage structures. But there is always one common denominator: a very high proportion of legacy data. Data is constantly captured, stored and therefore filed. After some time, nobody thinks about the data…
-
Fileserver Migration or Permission Optimization – Best Practice
Almost every company uses fileservers to make data available to employees. Over the years, the amount of data grows continuously. At the same time, the permissions on the individual folder structures are constantly changing. New employees are given permissions, in the best case obsolete permissions…
-
Share Permissions vs. NTFS Permissions – Differences at a Glance
If a company wants to share local resources such as files and folders, it must be possible to control access permissions efficiently and easily. To protect against unwanted access to company data, there are two ways to manage permissions:Share permissions and NTFS permissions. Both are intended…
Get in touch with us
Do you have any questions about our products or services? Do you need support?
We will be happy to help you!
permSECURE GmbH
Storkower Straße 115 A
10407 Berlin
Germany
Contact
+49 30 3642803 0
info@permsecure.com
MO-FR 08:00–17:00
© 2024 permSECURE GmbH | All rights reserved | Website by .kloos