• 28 Mar 2017

    Investigating and Recovering from a Security Breach in Your Hybrid AD and Azure AD

    Most organizations that migrate to Office 365 have done so in a hybrid environment—on-premises AD and Azure AD. Perhaps the most challenging aspect is managing and securing the entire surface area. Many organizations begin the process by creating systems that allow them to: Continually assess access privileges Detect and report suspicious activity Remediate access issues and mitigate repeat occurrences ...
    • 22 Mar 2017

    Remediating and Mitigating Privileged Access Issues in Your Hybrid AD and Azure AD

    The challenges associated with securing data in Office 365 , whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized. That plan begins with continually assessing permissions to ensure data is only available to those who should have access. It also requires implementation of a system that...
    • 17 Mar 2017

    Detecting and Reporting Security Issues in Hybrid AD and Azure AD—Visibility is Key

    If your organization is running Office 365 in a completely cloud-based or hybrid AD environment, it’s critical to make sure the proper security protocols are in place in both your on-premises AD and Azure AD. The first step is continuously assessing the hybrid AD to determine who has access to permissions, privileged groups, sensitive business groups, Group Policy Objects (GPO) and data at all times. Are you familiar...
    • 13 Mar 2017

    Hybrid AD and Azure AD Security Begins with Continuous Permissions Assessment

    If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move . Now that your new cloud or hybrid environment is in place and in good shape, how do you keep it secure? Maintaining security in a cloud or hybrid AD environment is no easy task. Download the Quest e-book Surviving Common...
    • 9 Mar 2017

    Securing Your On-Premises AD for Office 365 Migration

    As we previously discussed, migrating to Office 365 doubles the surface area you’ll need to manage and secure. As a result, it’s critical that any issues with data stored in your on-premises AD are corrected prior to migration. The good news is that making the move to Office 365 offers the opportunity to address any problems that exist while also creating policies that will keep it that way moving forward...
    • 7 Mar 2017

    Office 365 Security: Is On-Premises AD Your Weakest Link?

    Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies. Additionally, Office 365 empowers workforces to operate from anywhere and from any device, while increasing scalability and business continuity. However, moving...
    • 3 Mar 2017

    Reporting on Office 365 can save your company $$$$$$..

    Alright, you all have been using Office 365 environment for some time now, we guess that adoption rates of all the tools are high and that everyone is using every aspect – correct? I am sorry to say but it is easy to turn on features and raise subscription levels for users that will never use some of the feature set. It’s best to audit who is using what and how to trim away unused license levels to lower levels...
    • 17 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 4)

    Step 4: Control and simplify Group Policy management . Using GPOADmin, you can be very granular with who is allowed to do what with a particular Group Policy. Much like Active Roles, GPOAdmin allows you to grant specific rights to your Administrators and make the changes through a service account. Thus greatly reducing the need to grant the rights natively. Finally, we have secured Active Directory literally from...
    • 13 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 3)

    Okay, we have identified our privileged users and determined what rights are needed for them to do their jobs. Now we need a way to enforce these new roles. Step 3: Simplify the security of your Active Directory Active Roles is an AD proxy. It will sit between the user and Active Directory and determine if the user should be performing the task or not. Since the Active Roles service account is actually making the...
    • 8 Feb 2017

    Secure Automation Using Toad for Oracle

    While Toad for Oracle has had Automation for a long time now it has been necessary to run it on your desktop. While this is an important feature this limitation made it not ideal for organizations where security is imperative, such as in t...
    • 7 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 2)

    In my previous post, I touched on how you can identify users in AD with elevated rights . Now we need to determine if they're really necessary. Step 2: Identifying what rights are needed for the job. I can't begin to tell you how many companies that I've talked with who give out Domain Admin rights like candy. I've seen Sr. Admins with it, I've seen Jr. Admins with it, heck I've seen Help...
    • 3 Feb 2017

    Securing your Active Directory Environment from the Inside Out. (Part 1)

    In speaking with a lot of my customers, the topic of "How can I better secure my Active Directory environment ?" always seems to come up. There are several ways to answer this question, but today I want to focus on the one that seems to be overlooked most often: privileged user accounts. I've always compared privileged users to teenagers. Can you really trust that they're using the best judgement?...
    • 2 Feb 2017

    The 3 C's of Data Protection

    The Three C’s of Data Protection When searching for the best solution for backing up your data, it doesn’t matter whether you are a Fortune 50, Fortune 500 or a small to mid-size organization. What does matter is w...
    • 29 Jan 2017

    Setting up Replication in Rapid Recovery

    One of the core tenants for a robust backup and recovery infrastructure is replication of data. If you have a major disaster, properly replicated backups will save the day and potentially your company. In this blog, I will detail how you set up repli...
    • 22 Jan 2017

    Don't Let Your Disaster Recovery Plan Be a Disaster

    The boxer, Mike Tyson, once said, "Everyone has a plan 'till they get punched in the mouth." The same goes with most Disaster Recovery Plans for data in environments today. Everything is clicking along good until something happens, hum...
    • 19 Jan 2017

    Better Together: SAN Replication and Disaster Recovery Replication

    Production SAN environments are becoming more and more prevalent in businesses across the board from SMB all the way to large enterprise. A SAN gives you the ability to have a central pool of storage that is high speed and modular to an extent. You ...
    • 18 Jan 2017

    I backup my data already. But is that enough?

    You might think you have good data backup plan , but do you know what to do when you lose your data or when your business has to relocate in an emergency? How often do you have your team go through a restore of your backup? How fast can you acces...
    • 10 Jan 2017

    Data Protection for Hyperconverged Infrastructure

    With the constant evolution of the software-defined datacenter landscape, the latest trend, undoubtedly, is towards converged platforms – namely, hyperconverged and superconverged infrastructure. At the heart of hyperconvergence is the idea of consolidation – that is to combine virtualization, compute, storage, networking, backup and disaster recovery, and high availability in to a unified scale-out appliance...
    • 9 Jan 2017

    NetVault Virtual Client for Oracle Clustered Environments

    The NetVault Plug-in for Oracle provides support for Oracle Server Failover Clustering. Using the failover cluster network name, the plug-in is able to identify the current node that is in control of the Oracle Server Cluster...
    • 13 Dec 2016

    Storage Groups – The Next Weapon In Your Arsenal For Data Protection

    Storage Groups: Your Next Data Protection Bullet OK – so you may now have an awesome data deduplication appliance in your environment. Using it gives you the peace of mind that data can be quickly backed up and recovered. But what ...
    • 23 Nov 2016

    Data Protection: The Cost of Doing Nothing

    Life is about making decisions. Every decision will start with a simple question and assessing the options. What will I wear today? Will I travel by car or by train for my meeting this morning? Simple questions with potentially, a massive impact. You...
    • 18 Nov 2016

    How to Write Simple, Scalable HTML Powershell Graphic User Interfaces for managing Rapid Recovery (2 of 3)

    Part one of this blog post may be retrieved here . Part three of this blog post may be retrieved here . In the previous post we worked together toward laying the foundation for a simple and scalable PowerShell GUI framework for managing Rapid Recover...
    • 16 Nov 2016

    Insider Threats: Are You Protected?

    Our data and systems are frequently under attack these days. A more traditional attack is from external threats like viruses or hackers trying to gain access from outside of your environment. Threats from inside your environment are on the increase though so how are you going to approach securing your environment from within? What is an Insider Threat? An insider threat is a common term used by technical and non-technical...
    • 14 Nov 2016

    How To Protect Yourself Against Ransomware

    Before we go into the benefits of how Rapid Recovery can help in a Ransomware case lets level set on what Ransomware is and how it affects a system. Ransomware threats such as CryptoLocker or CryptoWall are becoming more prevalent in enterprises. Th...
    • 11 Nov 2016

    Storage Snapshots vs Backup Software: The Key to True Data Reliability

    In a world where data availability and integrity are paramount to the success of an organization, IT administrators are always looking for the best way to secure their data and keep the business running. One essential component of this strategy is b...