You've requested...

How to manage unwanted guests in Azure Active Directory

If a new window did not open, click here to view this asset.

Download this next:

Building an Identity Security Program

Building an effective identity security program is crucial in today's remote work and cloud-centric environment, as poor identity security can leave organizations vulnerable to cyberattacks. This white paper from Cisco Duo offers guidance on aligning goals, building capabilities, and focusing on key outcomes to secure workforce identities.

Read the full white paper to learn more.

These are also closely related to: "How to manage unwanted guests in Azure Active Directory"

Find more content like what you just read:

  • Best practices for identity access and security compliance

    Zero trust network access (ZTNA) is a critical component and key player in the future of cybersecurity, and this white paper explores key best practices you can implement to optimize ZTNA and defend identities. Read on to learn more.

    Download

  • The great IAM - time to modernise?

    In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?

    Download

  • How to spend your budget and time wisely when moving your organisation to the cloud in the Middle East

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

    Download

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • Jargon Buster Guide to Container Security

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

    Download

  • The 2023 Digital Transformation Report

    The concept of digital transformation has taken on new meaning for travel and hospitality in 2023.  Click here to learn more.

    Download

  • How best to put collaboration tools to work for your team

    This collection of recent expert advice aims to make your quest for the best option a bit easier. Read on and learn the latest on what collaboration tools now offer, including advanced technology like AI and speech recognition.

    Download

  • Jargon Buster Guide to Virtualisation

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.

    Download

  • CW ASEAN: Connect your people

    Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.

    Download

  • 4-step process for migrating VMs successfully

    Read this detailed Migrate VMs to KVM: A how-to guide to understand the benefits and process of migrating VMs from common hypervisors to cloud-first stacks powered by KVM. It includes a detailed step-by-step process and a Command List.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Data governance more important now than ever

    As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • 15 Reasons To Adopt Red Hat Openshift Virtualization

    In this e-book, you'll learn how Red Hat OpenShift Virtualization can simplify IT operations by unifying virtual machines and containers on a single platform. Read on now to discover 15 key benefits, including improved performance, security, scalability, and more.

    Download

  • How do Iconic Business Models such as Airbnb Emerge?

    Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.

    Download

  • Jargon buster guide to database management

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

    Download

  • Top 10 Australian IT stories of 2020

    Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:

    Download

  • Jargon buster guide to hybrid cloud storage

    In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.

    Download

  • CW ASEAN: European data law - be aware and prepare

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

    Download

  • A Computer Weekly buyer's guide to zero-trust security

    Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.

    Download

  • Cloud networking and CDN: How to get the best for your business

    In this e-guide we will be looking at how to bring innovative new software-defined tools to bear on multicloud environments, uncover some of the potential pitfalls of cloud networks and (hopefully) how to avoid them, and take a swing through the related world of content delivery networks (CDNs).

    Download

  • IAM: Managing identity remains key to cyber security

    IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.

    Download

  • VMworld Europe 2016: What to expect

    VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.

    Download

  • 15 Reasons To Adopt Red Hat OpenShift Virtualization

    Red Hat OpenShift Virtualization offers a modern platform for virtual machines and container-based applications. Read this e-book to unpack the remaining reasons to migrate your traditional VMs to Red Hat OpenShift.

    Download

  • AWS for RMS Modern Revenue Management in the Cloud

    This guide is designed to help business and technical leaders in the travel and hospitality (T&H) industry modernize and optimize their revenue management(RM) practices to improve company profitability. Click here to learn more.

    Download

  • Jargon Buster Guide to Voice over IP (VoIP)

    In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.

    Download

  • AI tools for software developers: Part Two

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

    Download

  • Essential Guide: Optimising hybrid IT infrastructure

    In this essential guide, we include articles looking at best practice and key technologies in server, storage, networks, DevOps and hyperconverged systems to make the most of your hybrid IT.

    Download

  • Top 10 Benelux IT stories of 2018

    The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.

    Download

  • Top 10 Middle East stories of 2018

    With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.

    Download

  • Pre-webinar checklist: 10 key considerations

    From doctors to airline pilots, checklists are crucial to success for even the most skilled professionals. By following these simple best practices you can create a smooth webinar experience that will improve your program success. Download your copy of the “Pre-Webinar Checklist,” to get started.

    Download

  • Proactive Security: Software vulnerability management and beyond

    In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

    Download

  • A Computer Weekly buyer's guide to network cost and bandwidth optimisation

    Coming in under budget for appropriate network performance takes some strategic nous. In this 15-page buyer's guide, Computer Weekly looks at how companies can gain effective global coverage, what can be done to optimise networks in a shift towards hybrid working and why leaders should consider best practices carefully.

    Download

  • AI tools for software developers: Part One

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

    Download

  • It's hyper converged-with-everything in today's datacentre

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

    Download

  • Integrating Brivo’s Access Control APIs in the Community Parking Garage

    Ledger, a modern, mixed-use destination workplace, needed a parking garage service that offered digital and mobile accommodation. With a joint solution from Parkable and Brivo eases Ledger’s administrative burden and saves money, providing easy-to-use digital booking with Brivo’s access control APIs ensuring security. Read on to learn more.

    Download

  • Identity trends for 2023

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

    Download

  • Security analytics: Enabling organisations to get ahead of attackers

    In the face of an ever-increasing number of cyber-attacks, many organisations are turning to security analytics, which is the use of data to measure and detect potential breaches. In this e-guide we provide 6 case studies on when and when not to use security analytics.

    Download

  • How server virtualisation is evolving to cloud native environments

    In this e-guide we discover how, in recent years, server virtualisation has given businesses the ability to abstract applications and the operating system from the underlying hardware. We explore how server virtualisation is gradually evolving towards cloud native environments.

    Download

  • Infographic: 7 steps to secure your home wi-fi network

    Wi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.

    Download

  • CIO Trends #9: Middle East

    In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.

    Download

  • Focus: Network security

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

    Download

  • How to Secure Users at the Network Edge

    Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.

    Download

  • CIO Trends #7

    Read some of our most popular articles on issues faced by IT decision makers, such as how to get the most out of the internet of things, and how to tailor your IT operating model to fit in the digital age.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • Collaboration software in the era of Gen-Z

    In this e-guide, learn how Microsoft is dominating the Software-as-a-Service space thanks to its strength in collaboration software and how the new generation of collaboration software could be stoking communication overload. Also, check out our chart comparing Slack, Microsoft Teams and Spark.

    Download

  • CIO Trends #4: Middle East

    In this e-guide, we look at some of the exciting technology developments being tested or already in use in the Middle East.

    Download