Identity Security Risk Assessment
Get a free AD security assessment to evaluate your environment and identify the most actionable issues.
Related Articles

Monitoring and Evaluating Database Configurations with AWS Config – Part I
Introduction Consider the use case that multiple AWS resources are running to support applications running on AWS. (We shall mainly be concerned with the AWS databases RDS, Redshift, and DynamoDB.) An...

How to compare DDL in a file to live DB objects in Toad for DB2 LUW
This video demonstrates how to compare DDL in a file to live DB objects in Toad for DB2 LUW....

What Oracle 12cR2 brought us in 2017 and what Oracle brings us for 2018
By Deiby Gómez (OCM11g , MAA OCM 12c and Oracle ACE Director) The year 2017 brought us a lot of good Oracle stuff; Oracle Database version 12cR2 was released for On Premises, and the new Autonomous D...