7th November 2024
Hilton London Canary Wharf
24th June 2025
Hilton London Canary Wharf
Close this search box.

WEBINAR: Top 5 reasons why you need an access management solution

By Tenfold Security Do you know WHO in your organization has access to WHAT systems and data? If you don’t know the answer, chances are you haven’t yet employed an IAM solution. And that means your company is at high risk for data theft. You might be struggling to invest the administrative efforts required to […]

5 Minutes With… Tenfold Security’s Helmut Semmelmayer

Helmut Semmelmayer currently heads channel sales at the software company tenfold software. Having worked on countless customer projects, he has extensive knowledge of the challenges that organizations face when it comes to protecting data from unauthorized access. His goal is to educate businesses and build awareness for current and future access-based attack patterns… Tell us […]

Joiner-Mover-Leaver process: Solve it once and for all?

By Tenfold Security JML processes give IT and HR departments regular headaches and often create quite hefty conflicts between those two departments. What is this all about? When a new employee joins your organization, HR will know about them first, as they sign the contracts and do the onboarding. Today, many employees will require IT […]

Identity Access Management vs. Access Rights Management – What’s the Difference?

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions. Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/ If you are […]

User Access Review – What’s That?

By Tenfold Security Users come, they stay, they leave, they move around between departments and they collect privileges on the way. That’s OK, they need privileges to do their jobs. But do they need all the privileges they have, always? That’s a question you need to ask yourself, for every user, repeatedly. This article covers what is meant by a user access […]