Topic
![ransomware-ebook-23](/active-directory-360/manage-and-protect-identities/iam-library/images/ransomware-ebook-23.png)
Ransomware: How attackers weaponize Active Directory and what defense measures can stop them
Download (.pdf)![approach-towards-threat-detection-backup-and-recovery](/active-directory-360/manage-and-protect-identities/iam-library/images/approach-towards-threat-detection-backup-and-recovery.png)
Countering ransomware: A 3-step approach towards threat detection, backup, and recovery
Download (.pdf)![nist-and-hipaa-compliance-remediate-risks-ebook-23](/active-directory-360/manage-and-protect-identities/iam-library/images/nist-and-hipaa-compliance-remediate-risks-ebook-23.png)
NIST and HIPAA compliance: Remediate risks, address compliance gaps, and ensure PHI integrity
Download (.pdf)![nist-and-hipaa-compliance-roadmap-ebook-23](/active-directory-360/manage-and-protect-identities/iam-library/images/nist-and-hipaa-compliance-roadmap-ebook-23.png)
NIST's guidance for a roadmap for deploying an enterprise security model zero trust architecture
Download (.pdf)![seamless-continuity-for-your-business](/active-directory-360/manage-and-protect-identities/iam-library/images/seamless-continuity-for-your-business.png)
Implement strong password management to deliver seamless continuity for your business
Download (.pdf)![nist-password-policy-ebook-23](/active-directory-360/manage-and-protect-identities/iam-library/images/nist-password-policy-ebook-23.png)
NIST password policy recommendations and how they compare with current password practices
Download (.pdf)Thank you for downloading our e-book!
If you don't see the e-book in your inbox in the next few minutes,
please check your spam folder.