• 21 Sep 2017

    Be Ready for Tomorrow. Quest VROOM 1.2 launches and we're bringing Hybrid Cloud management to Microsoft Ignite

    What's great about being a product manager? To me, the list is long, however, today it's the release of Quest VROOM 1.2 and Foglight for Virtualization 8.7, and it's not for the normal reasons. Sure, I'm excited about a new release, i always am, they take an unbelievable amount of hard work, that aside, this release is special. The RnD team I work with has done a brilliant job; they not only met the...
    • 21 Sep 2017

    Fortune Cookies Don’t Lie: Office 365 Cloud Security Is in Your Future

    The meal is finished, so your waiter brings the check and a handful of fortune cookies. One by one, you and your friends go around the table reading them. “‘You cannot stop the waves, but you can learn to surf.’ Well, that’s profound.” “‘The love of your life will appear in front of you unexpectedly.’ Huh. I never could have guessed that.” “‘A great...
    • 21 Sep 2017

    Improving Active Directory Security with Blue Team defense services

    A few weeks ago, Bryan Patton wrote about using Microsoft's Enhanced Security Admin Environment (ESAE) to improve your Active Directory security . Whether you make the decision to migrate to an ESAE environment, to an "Orange Forest", or to harden your existing environment, Quest can help you identify and remediate existing gaps as well as provide proactive management to prevent future gaps from developing...
    • 20 Sep 2017

    Nail Your Security Audits and Assessments – Enterprise Reporter Suite

    “Call and let me know how much fun you’re having,” I told my cousin when she went off to college a few weeks ago. “As if,” she said. “What’s the big deal?” I said. “Spend five minutes and tell me how much fun you’re having.” “I’d rather spend those five minutes having fun than reporting on it. You’re on my finsta ; that’s all...
    • 20 Sep 2017

    When $#!% hits the fan, what’s your Azure AD recovery plan? Find out at Microsoft Ignite!

    Identity is the new control plane, which means that being able to back up and recover both your on-premises Active Directory and Azure Active Directory (AD) is critical. But most customers I work with don’t know how to respond if sensitive objects are accidentally or maliciously deleted from Azure AD. See, if you use Microsoft Azure AD or Office 365 , it is important to understand the differences between the on...
    • 19 Sep 2017

    How to protect against AD security breaches and insider threats? Find out at Microsoft Ignite!

    Remember Hank the Hacker ? Hank is a fictional character we created for a recent webcast series around Active Directory security best practices. Hank represents hackers that appear in many shapes and sizes and who love to exploit the security limitations of AD, Azure AD and Office 365 . Hank the Hacker will send cyberattacks on your email, he’ll block login access with ransomware, he’ll use pass-the-hash techniques...
    • 19 Sep 2017

    How to configure Foglight to run as a daemon on a Unix Machine?

    Once you installed Foglight on a Unix machine, you might want the Foglight processes to start/stop automatically when you reboot the machine. This is not difficult to do and the Foglight installation includes already init.d-styled scripts which can be used. As Unix machines are often customized, the scripts are model scripts and provide the basic required functionality. You might need to customize the scripts further...
    • 19 Sep 2017

    Virtualize Oracle Databases like an Oracle ACE

    Imagine a world where your system administrator provisions a fully functional Linux server that’s patched with all the up-to-date kernel parameters, device drivers and configurations in just one hour. Come on. For real? Yep. Now imagine this: ...
    • 18 Sep 2017

    Detecting Active Directory breaches: How to Focus on the Needles and Not the Haystacks

    One thing is for certain – security has never been so scrutinized and publicized as it has these last few years. IT security spending is the highest it has ever been and yet cyberattacks, and the stolen company and customer data that follows, continues to dominate headlines. Just this month as many as 143 million customers were affected by the breach at credit reporting agency Equifax. The worldwide economic impact...
    • 18 Sep 2017

    The Top Five Oracle OpenWorld Sessions

    With so many of the world’s biggest names in IT speaking at Oracle OpenWorld , you have the opportunity to vastly expand your knowledge. But with a whopping fifty speaking sessions to choose from, where do you even begin? Relax. We’ve got...
    • 13 Sep 2017

    Shirt me at Microsoft Ignite

    Humans, by nature, are obsessed with free things. This is one of the main reasons I avoid Costco during peak sample hours. And the only thing better than free things – are cool free things. That’s why I’m personally pumped about our daily giveaways and raffle prizes happening in booth 717 at Microsoft Ignite . So, whatcha got? First, we’re giving away #STOPHANK t-shirts and some other cools...
    • 12 Sep 2017

    DR 4300e Core performance Improvements

    DR 4300e Core performance improvements using the latest DR OS 4.0.0.3 The DR4300e Core is an entry level deduplication appliance that scales from 4.5TB to 27TB of post RAID usable capacities. The latest DR operating system – DR OS version 4.0.0.3 include components that are specifically designed for the DR4300e Core to create significant performance enhancements. A popular way to test the performance of deduplication...