page-header

Active Directory

PRACTICAL CYBERSECURITY: HOW TO STOP INSIDER THREATS WITHOUT LOGS, NO TUNING & AT AN AFFORDABLE COST.

PRACTICAL CYBERSECURITY: HOW TO STOP INSIDER THREATS WITHOUT LOGS, NO TUNING &...

Read more
PRACTICAL CYBERSECURITY: Extending MFA Controls to Legacy Applications, Legacy Network Resources & Administrative Tools!

Legacy apps, legacy network resources, legacy authentication protocols, administrative tools, are part...

Read more
PRACTICAL CYBERSECURITY: Defending Against One Of The Most Sophisticated Vulnerabilities In Any IT Infrastructures.

Vulnerabilities inherent in the NTLM Authentication protocol remains a massive albatross for...

Read more
Exclusive: Hackers tried to exploit two zero-days in Trend Micro’s Apex One EDR platform.

Why Proactive Active Directory Security Should Be Part of Organizations Cyber Defense...

Read more
Avoiding False Sense of Security With Current MFA Controls.

There are multiple ways that attackers can BYPASS existing MFA controls once...

Read more
Active Directory Security.

Have an Active Directory infrastructures? Read this https://www.smsam.net/services/active-directory-security-assessment/

Read more
Active Directory Security Assessment.

Does your organization have Active Directory Infrastructure? If yes, you might want...

Read more
Optimize Your Current MFA Capabilities Across Your Entire Organization IT Infrastructures.

Traditionally, some organizations only leverage MFA mitigations to cover a subset of...

Read more
Back to top of page
Our team is here to answer your questions. Ask us anything!
WeCreativez WhatsApp Support
Sales Executive
Sam
Available
WeCreativez WhatsApp Support
Technical Support
Quraysh
Away
WeCreativez WhatsApp Support
Customer Support
Balogun
Away
WeCreativez WhatsApp Support
Technical Support
Sowande
Available