• 22 Mar 2017

    Remediating and Mitigating Privileged Access Issues in Your Hybrid AD and Azure AD

    The challenges associated with securing data in Office 365 , whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized. That plan begins with continually assessing permissions to ensure data is only available to those who should have access. It also requires implementation of a system that...
    • 17 Mar 2017

    Detecting and Reporting Security Issues in Hybrid AD and Azure AD—Visibility is Key

    If your organization is running Office 365 in a completely cloud-based or hybrid AD environment, it’s critical to make sure the proper security protocols are in place in both your on-premises AD and Azure AD. The first step is continuously assessing the hybrid AD to determine who has access to permissions, privileged groups, sensitive business groups, Group Policy Objects (GPO) and data at all times. Are you familiar...
    • 13 Mar 2017

    Hybrid AD and Azure AD Security Begins with Continuous Permissions Assessment

    If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move . Now that your new cloud or hybrid environment is in place and in good shape, how do you keep it secure? Maintaining security in a cloud or hybrid AD environment is no easy task. Download the Quest e-book Surviving Common...
    • 10 Mar 2017

    Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    If there’s anyone that still doesn’t believe that an investment in security will pay dividends need only read today’s latest headline regarding the recent spate of breaches involving Yahoo. Here’s a link to just one of ...
    • 9 Mar 2017

    Securing Your On-Premises AD for Office 365 Migration

    As we previously discussed, migrating to Office 365 doubles the surface area you’ll need to manage and secure. As a result, it’s critical that any issues with data stored in your on-premises AD are corrected prior to migration. The good news is that making the move to Office 365 offers the opportunity to address any problems that exist while also creating policies that will keep it that way moving forward...
    • 7 Mar 2017

    Join Sponsor One Identity for March 9th Cyber Smoke

    Cyber Smoke is a premier after-hours networking event initially created for Industry and Government professionals to collaborate on cyber security initiatives at DHS. It has since grown from the 6 original founders to well over 850 Industry an...
    • 7 Mar 2017

    Office 365 Security: Is On-Premises AD Your Weakest Link?

    Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies. Additionally, Office 365 empowers workforces to operate from anywhere and from any device, while increasing scalability and business continuity. However, moving...
    • 3 Mar 2017

    Reporting on O365 can save your company $$$$$$..

    Alright, you all have been using O365 environment for some time now, we guess that adoption rates of all the tools are high and that everyone is using every aspect – correct? I am sorry to say but it is easy to turn on features and raise subscription levels for users that will never use some of the feature set. It’s best to audit who is using what and how to trim away unused license levels to lower levels...
    • 27 Feb 2017

    How Active Roles 7.1 Interfaces With Both On-Prem and Azure AD

    With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works. The ADSI provider serves as the interface between the Active Rol...
    • 27 Feb 2017

    Introducing Active Roles 7.1 – The Management and Security Solution for Hybrid AD

    Over the past couple of years Azure Active Directory and Office 365 have been quietly and steadily gaining ground within our businesses. While many administrators have been busy managing their environments, the level of effort involved in their dail...
    • 17 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 4)

    Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
    • 13 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 3)

    Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...
    • 8 Feb 2017

    RSA – The More Things Change, the More They Stay the Same

    This February 13-17, I’ll make my annual pilgrimage to San Francisco for the RSA Security Conference. And while I look forward to the ever-present long hours working the booth, the short walk from the hotel to the exhibit hall, runs along the wharf in the mornings, and a mandatory taste of sourdough bread and clam chowder, some things will be different. This is the first year where we will be participating in the...
    • 8 Feb 2017

    Secure Automation Using Toad for Oracle

    While Toad for Oracle has had Automation for a long time now it has been necessary to run it on your desktop. While this is an important feature this limitation made it not ideal for organizations where security is imperative, such as in t...
    • 7 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 2)

    In my previous post, I touched on how you can identify users in AD with elevated rights . Now we need to determine if they're really necessary. Step 2: Identifying what rights are needed for the job. I can't begin to tell you how many companies that I've talked with who give out Domain Admin rights like candy. I've seen Sr. Admins with it, I've seen Jr. Admins with it, heck I've seen Help...
    • 3 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 1)

    In speaking with a lot of my customers, the topic of "How can I better secure my Active Directory environment ?" always seems to come up. There are several ways to answer this question, but today I want to focus on the one that seems to be overlooked most often: privileged user accounts. I've always compared privileged users to teenagers. Can you really trust that they're using the best judgement?...
    • 2 Feb 2017

    The 3 C's of Data Protection

    The Three C’s of Data Protection When searching for the best solution for backing up your data, it doesn’t matter whether you are a Fortune 50, Fortune 500 or a small to mid-size organization. What does matter is w...
    • 29 Jan 2017

    Setting up Replication in Rapid Recovery

    One of the core tenants for a robust backup and recovery infrastructure is replication of data. If you have a major disaster, properly replicated backups will save the day and potentially your company. In this blog, I will detail how you set up repli...
    • 27 Jan 2017

    Solving the initial password dilemma

    Many times companies use an initial password that is partially or completely static (Summer2017?), or sometimes they use a formula which includes partial data of the user such as the month of birth + the three final digits of their Social Security, ...
    • 22 Jan 2017

    Don't Let Your Disaster Recovery Plan Be a Disaster

    The boxer, Mike Tyson, once said, "Everyone has a plan 'till they get punched in the mouth." The same goes with most Disaster Recovery Plans for data in environments today. Everything is clicking along good until something happens, hum...
    • 19 Jan 2017

    Better Together: SAN Replication and Disaster Recovery Replication

    Production SAN environments are becoming more and more prevalent in businesses across the board from SMB all the way to large enterprise. A SAN gives you the ability to have a central pool of storage that is high speed and modular to an extent. You ...
    • 18 Jan 2017

    I backup my data already. But is that enough?

    You might think you have good data backup plan , but do you know what to do when you lose your data or when your business has to relocate in an emergency? How often do you have your team go through a restore of your backup? How fast can you acces...
    • 12 Jan 2017

    My Prescription for Password Happiness: Take Three One Identity Solutions and Don't Call Helpdesk in the Morning

    The expense to unlock a user’s account goes far beyond billable helpdesk hours but also lost the productivity of everyone impacted by the lack of user access – including the user, the user’s internal and external clients – an...
    • 10 Jan 2017

    Data Protection for Hyperconverged Infrastructure

    With the constant evolution of the software-defined datacenter landscape, the latest trend, undoubtedly, is towards converged platforms – namely, hyperconverged and superconverged infrastructure. At the heart of hyperconvergence is the idea of consolidation – that is to combine virtualization, compute, storage, networking, backup and disaster recovery, and high availability in to a unified scale-out appliance...
    • 9 Jan 2017

    NetVault Virtual Client for Oracle Clustered Environments

    The NetVault Plug-in for Oracle provides support for Oracle Server Failover Clustering. Using the failover cluster network name, the plug-in is able to identify the current node that is in control of the Oracle Server Cluster...
Read Tech Center Blog Posts RSS