If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend.
Here’s one Active Directory best practices session you won’t want to miss!…
If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend.
Here’s one Active Directory best practices session you won’t want to miss!…
Active Directory is at the heart of it all, providing authentication and authorization for critical resources across your on-premises, cloud and hybrid IT environments. Whether you’re running AD, Azure AD or both, Quest has the deep expertise you need…
You are probably aware that cyber attacks are increasing dramatically every year, but have you actually looked at the numbers? They are truly staggering. For example, Symantec’s 2018 Internet Security Threat Report found that:
Quest InTrust 11.3.2 maintenance release happened last week. One of the main features is improved and expanded support for Linux OS. Let me focus on this topic and provide some details about how InTrust can be used to setup truly centralized and feature…
Has your company been hit by ransomware yet? How about other types of malware? Phishing scams, drive-by downloads or pass-the-hash attacks? If you haven’t already, you probably will be soon.
What do all these attacks have in common? They start…
Being an IT administrator can be an enjoyable, rewarding job. So is parenting, for that matter. But being an IT administrator can also be incredibly stressful with frequent hair-pulling moments. Again, those amongst us that are parents no doubt share…
Currently 30% of companies in the United States are using the NIST Cybersecurity Framework to manage risks with projections of 50% by the year 2020 (https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/).
Quest has a broad portfolio…
In the early days of Active Directory, a decision had to be made as to whether you were going to do an in-place upgrade of your existing Windows NT 4.0 environment, or if you were going to do a “greenfield” migration. Some organizations had multiple…
We are excited to announce a new version of Privilege Manager for Windows 4.1 is now available for download. Look what's new:
|
Market and regulatory changes such as the Affordable Care Act are fueling a historic period of consolidation in the healthcare market. Independent health systems are struggling to survive on their own due to reduced payouts, driving mergers, acquisitions…
Several forces are combining to create a historic period of consolidation in the healthcare industry.
Increased competition, a shift to outcomes-based reimbursement models, and an overall need to widen the scope of care while reducing costs are driving…
If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more…
The challenges associated with securing data in Office 365, whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized.
That…
If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move. Now that your new cloud or hybrid environment is in place…
Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies…
Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and…
In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary.
Step 2: Identifying what rights are needed for the job.
I can't begin to tell you how many companies that…