• 14 Feb 2018

    Overcome Office 365 recovery and compliance gaps.

    Overcome Office 365 recovery and compliance gaps. Quest OnDemand, Whats it all about? What is Quest On Demand? I hear you ask; Quest On Demand is a Simplified SaaS-based cloud backup, recovery and policy management solution. If you are one of the many orginisations moving to O365 you are venturing into a new and exciting productivity platform. You will be aware of both the benefits and potential risks to venture to...
    • 7 Feb 2018

    Modeling User Behavior to Identify Insider Threats

    A pattern-based threat detection strategy will drastically reduce the number of false positives and offers a manageable number of actionable alerts. Learn more.
    • 30 Jan 2018

    How to Detect and Mitigate PowerShell-Based Cyber Attacks in Your Infrastructure with InTrust

    Probably everyone in the IT world heard at least something about mimikatz – a PowerShell library for performing targeted attacks in Microsoft Windows infrastructure. There are numerous other PowerShell toolkits developed to help attackers to recon, to stay undetected and to perform attacks. Some of the attack vectors can be identified by clever threat detection software that monitors user behavioral patterns to...
    • 29 Jan 2018

    It's time to start planning for spring cleaning with Migrator for Notes to Exchange

    Migrating to a new mail system presents a great opportunity to "clean up" old data. In support of this goal, Migrator for Notes to Exchange (MNE) provides considerable flexibility in how and where data can be migrated. MNE allows you to migrate data into Exchange in 3 different ways: MNE Target Types: Server-based mailbox: This option tells MNE to migrate data to your traditional Exchange Inbox. Typically...
    • 25 Jan 2018

    [Transcript] Preparing for the Disgruntled Privileged User — 3 Ways They Can Hose Your Environment in Minutes

    Did you miss our recent webcast: Preparing for the Disgruntled Privileged User - 3 Ways They Can Hose Your Environment? Get the Transcript or Webcast Download.
    • 19 Jan 2018

    Using Pattern-Based Threat Detection to Identify Suspicious User Activity

    Detect suspicious user activity, hackers, intruders, malware, disgruntled employees, rogue users and other insider threats early, save money and time. Learn more.
    • 8 Jan 2018

    2018 Cyber Security Trends – The Rise and Risks of Insider Threats

    Cyber security threats from external attackers are a constant worry for all organizations, as evidence by the many recent, headline-grabbing Ransomware data breaches such as WannaCry, Petya, Bad Rabbit . However, today’s most damaging cyber security threats are not just originating from malicious outsiders or malware, but from insider threats . In fact, according to the 2018 Insider Threat Report by Cybersecurity...
    • 5 Jan 2018

    Modernization and Cyber Security — 2018 IT Priorities for the Federal Government

    The push for IT modernization at federal agencies is converging with the need for stronger cyber security. And the demands to achieve those goals as quickly and cost-effectively as possible are equally pressing. Enhancing security, improving service delivery, and making more efficient use of resources are the key goals in the American Technology Council’s draft report on federal IT modernization . The White House’s...
    • 11 Dec 2017

    In data migrations, the little things make the difference.

    A day in the life of a pre-sales systems engineer ebbs and flows between learning new tricks, doing what you did yesterday again and dealing with issues no one understands. The other day, I had one of the latter. It was a true test of my skills as an engineer and the capabilities of a few specific products that came together in the end for the win — and a win in record time. A new customer purchased Quest Secure...
    • 20 Nov 2017

    What’s your hybrid AD and Azure AD recovery plan?

    Whether you are running a hybrid Active Directory (AD) environment with Azure AD Connect, or have cloud-only objects or attributes that aren’t synchronized, it’s critical for security and compliance purposes to ensure the availability and integrity of both on-premises AD as well as Azure AD. According to a recent Microsoft blog , there continues to be strong growth with organizations using Azure AD or Azure...
    • 13 Nov 2017

    A new version of On Demand Migration for Email (ODME), 1.11 has been deployed!

    We are excited to announce a new version of On Demand Migration for Email (ODME) 1.11 has been deployed. Quest® On Demand Migration for Email securely migrates data to Office 365 and on-premises Exchange or hosted Exchange email platforms leveraging a hosted infrastructure to minimize the footprint within each organization. From a single console, you can migrate multiple mailboxes simultaneously, including data...
    • 10 Nov 2017

    A new version of Migrator for Notes to SharePoint is now available!

    We are excited to announce a new version of Migrator for Notes to SharePoint 6.10 is now available for download. Look what's new: o Support for setting a stop time for scheduled migration task. o Support for creating scheduled task for the SharePoint site provision (Git# 544). o Support for migrating to SharePoint Document Set fields with Azure Turbo mode. o Support for opening embedded attachments in PDF and...
    • 7 Nov 2017

    Bad Rabbit Ransomware: What You Need To Know About the Latest Cyber Attack

    The Bad Rabbit ransomware cyber attack hit last week in Russia and Eastern Europe, targeting news media companies and some transportation companies such as Airport of Odessa in Ukraine. In a nutshell the tactic that bad guys are using is as old as WannaCry and others – find a way to compromise your security (either by phishing technique or by using known vulnerability, or both), install itself on the affected machine...
    • 6 Nov 2017

    How to Secure Active Directory Using the NIST Cybersecurity Framework

    Currently 30% of companies in the United States are using the NIST Cybersecurity Framework to manage risks with projections of 50% by the year 2020 ( https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/ ). Quest has a broad portfolio of products that can help with these different stages, but I wanted to highlight how our Microsoft platform management solutions can help with capabilities to manage...
    • 1 Nov 2017

    Engineering notes for Secure Copy

    I’ve had so many customers — and even engineering colleagues — ask me how to get the most out of their Quest Secure Copy implementation that I thought it was time to write up a few best practices. You know that Secure Copy is an automated solution for securely migrating data, shares, printers and more. You know it lets you control how data is migrated and doesn’t require the use of agents or...
    • 24 Oct 2017

    What's new in Archive Manager v.5.4? Better search and enhanced ADC service!

    What's new in this release? We are happy to announce the release of Archive Manager 5.4 ! Archive Manger now includes some great new features that will enhance search, provide better support for Office 365 and loads of new platforms.&...
    • 23 Oct 2017

    Migrator for Notes to Exchange update required for migrations to Office 365!

    We are excited to announce a new version of Migrator for Notes to Exchange 4.15.1 is now available for download. This update is required for customers migrating to Office 365 and should be installed prior to October 31 st , in order to meet new Office 365 requirements . Look what's new: MAPI over HTTP This release adds support for MAPI over HTTP. This is now the default protocol when migrating to Office 365...
    • 27 Sep 2017

    On Demand Migration for Email now migrates Exchange Recoverable Items to Office 365

    Are you considering migrating to Office 365, or an on-premise Exchange server? Perhaps your company is involved in a merger or divestiture and you need to migrate under a condensed timeline, from one Office 365 tenant to another Office 365 tenant… Would you like a solution that requires no on-premise infrastructure and scales up to meet your migration needs automagically? Well the good news is that many customers...
    • 25 Sep 2017

    Get Rid of Your Old Coffee Makers – Pre- and post-migration analysis with Enterprise Reporter

    When you move out of a house, do you just toss everything into boxes, then throw the boxes into a truck? That’s a pretty tempting approach to moving, especially if you don’t really want to move in the first place. But look what a mess awaits you at the new house. You can’t put your hands on anything useful when everything’s in a jumble. Worse yet, you also realize that you’ve missed a good...
    • 21 Sep 2017

    Fortune Cookies Don’t Lie: Office 365 Cloud Security Is in Your Future

    The meal is finished, so your waiter brings the check and a handful of fortune cookies. One by one, you and your friends go around the table reading them. “‘You cannot stop the waves, but you can learn to surf.’ Well, that’s profound.” “‘The love of your life will appear in front of you unexpectedly.’ Huh. I never could have guessed that.” “‘A great...
    • 21 Sep 2017

    Improving Active Directory Security with Blue Team defense services

    A few weeks ago, Bryan Patton wrote about using Microsoft's Enhanced Security Admin Environment (ESAE) to improve your Active Directory security . Whether you make the decision to migrate to an ESAE environment, to an "Orange Forest", or to harden your existing environment, Quest can help you identify and remediate existing gaps as well as provide proactive management to prevent future gaps from developing...
    • 20 Sep 2017

    Nail Your Security Audits and Assessments – Enterprise Reporter Suite

    “Call and let me know how much fun you’re having,” I told my cousin when she went off to college a few weeks ago. “As if,” she said. “What’s the big deal?” I said. “Spend five minutes and tell me how much fun you’re having.” “I’d rather spend those five minutes having fun than reporting on it. You’re on my finsta ; that’s all...
    • 20 Sep 2017

    When $#!% hits the fan, what’s your Azure AD recovery plan? Find out at Microsoft Ignite!

    Identity is the new control plane, which means that being able to back up and recover both your on-premises Active Directory and Azure Active Directory (AD) is critical. But most customers I work with don’t know how to respond if sensitive objects are accidentally or maliciously deleted from Azure AD. See, if you use Microsoft Azure AD or Office 365 , it is important to understand the differences between the on...
    • 19 Sep 2017

    How to protect against AD security breaches and insider threats? Find out at Microsoft Ignite!

    Remember Hank the Hacker ? Hank is a fictional character we created for a recent webcast series around Active Directory security best practices. Hank represents hackers that appear in many shapes and sizes and who love to exploit the security limitations of AD, Azure AD and Office 365 . Hank the Hacker will send cyberattacks on your email, he’ll block login access with ransomware, he’ll use pass-the-hash techniques...
    • 18 Sep 2017

    Detecting Active Directory breaches: How to Focus on the Needles and Not the Haystacks

    One thing is for certain – security has never been so scrutinized and publicized as it has these last few years. IT security spending is the highest it has ever been and yet cyberattacks, and the stolen company and customer data that follows, continues to dominate headlines. Just this month as many as 143 million customers were affected by the breach at credit reporting agency Equifax. The worldwide economic impact...