White Papers

White Paper - 3 Steps to Getting Data Access Governance off your To-Do List

3 Steps to Getting Data Access Governance off your To-Do List

White Paper - 4 Active Directory Attacks and How to Protect Against Them

4 Active Directory Attacks and How to Protect Against Them

White Paper - Performing Domain Reconnaissance using Powershell

Performing Domain Reconnaissance using Powershell

White Paper - Attack Mapping with Bloodhound

Attack Mapping with Bloodhound

White Paper - Extracting Password Hashes from the NTDS.Dit File

Extracting Password Hashes from the NTDS.Dit File

White Paper - Performing Pass - The Hash Attacks with Mimikatz

Performing Pass - The Hash Attacks with Mimikatz

5 Challenges with Combining Data Access Governance and Identity and Access Management

5 Challenges with Combining Data Access Governance and Identity and Access Management

White Paper - 5 Challenges with Monitoring Active Directory Security Using Event Logs

5 Challenges with Monitoring Active Directory Security Using Event Logs

white Paper - 5 Challenges with Monitoring Windows File Activity

5 Challenges with Monitoring Windows File Activity

white Paper - 2015 Trends for Security Professionals

2015 Trends for Security Professionals

white Paper - 2015 Trends for Security Professionals

2017 RSA Conference Survey Results

White Paper - Access Governance & Compliance for Healthcare

Access Governance & Compliance for Healthcare

White Paper - Access Governance Made Simple White Paper

Access Governance Made Simple

White Paper - The Access Governance Challenge

The Access Governance Challenge

White Paper - A Look into Active Directory across Organizations

A Look into Active Directory across Organizations

White Paper - Active Directory Maintenance & Cleanup

Active Directory Maintenance & Cleanup

White Paper - Active Directory Security Monitoring

Active Directory Security Monitoring

White Paper - Addressing Real World Security & Compliance Needs

Addressing Real World Security & Compliance Needs

White Paper - Building a Successful Data Access Governance Program to Control Unstructured Data

Building a Successful Data Access Governance Program to Control Unstructured Data

White Paper - Closing The Door On Open Access

Closing The Door On Open Access

White Paper - In The Know About GPOs

In the Know About GPO(s)?

White Paper - Domain Consolidation

Domain Consolidation

White Paper - Achieving EU GDPR Compliance

Achieving EU GDPR Compliance

White Paper - Getting Unstructured Data Under Control for Security and Compliance

Getting Unstructured Data Under Control for Security and Compliance

2017 EU GDPR Report

EU GDPR Report

White Paper - Reducing The Security Threat Surface

Reducing the Security Threat Surface

White Paper - Security Information and Event Management

Security Information and Event Management

White Paper - Solving The Public Folder Problem

Solving the Public Folder Problem