For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Our 2019 predictions for Windows and Office 365 pros

Improve AD Security to Protect Your Resources 02:23

Wouldn’t it be nice to see into the future and predict all the projects, fire drills and last-minute tasks that will come your way in 2019? We thought so. That’s why we pulled out our crystal ball and saw ten big trends and events that will likely make their way to your to-do list as a Windows and Office 365 professional. We don’t only focus on security, but on all aspects of your role, including:

  • Fortifying Active Directory (AD) security
  • Monitoring PowerShell scripting and cloud configurations
  • Evading ransomware attacks
  • Building resiliency in your AD disaster recovery plan
  • Meeting regulatory compliance
  • Consolidating environments after an M&A
  • Finding time in there to explore Microsoft Teams

Don’t hesitate; this in-depth predictions series is all you need to plan out your year!

Get the nine best practices to reduce Active Directory security breaches and insider threats

Follow these nine critical security best practices to help minimize the risk of insider threats to the availability, confidentiality and integrity of your AD.

Read E-book

Want to chat?

2019 is going to be a busy year. You’ll need a partner by your side every step of the way—and that’s where we can help.

Resources

Designing a Multilayered, In-Depth Defense Approach to AD Security
White Paper
Designing a Multilayered, In-Depth Defense Approach to AD Security
Designing a Multilayered, In-Depth Defense Approach to AD Security
This white paper details the logical and administrative layers of security that you should implement to improve your AD security posture and describes the features you should look for in third-party solutions, such as the Active Directory security suite
Read White Paper
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
E-book
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
Top 3 workstation logs to monitor: Improve endpoint security with Sysmon, PowerShell and security logs
Improve endpoint security and log management. Learn the top 3 workstation logs to monitor and how Quest InTrust and IT Security Search simplify the process.
Read E-book
Plan Ahead to Avoid AD Disaster
Plan Ahead to Avoid AD Disaster

02:10

Video
Plan Ahead to Avoid AD Disaster
Recovery plans and backups will help companies avoid AD disaster.
Watch Video
Prepare Against Evolved Ransomware Attacks
Prepare Against Evolved Ransomware Attacks

01:55

Video
Prepare Against Evolved Ransomware Attacks
Cybercriminals have changed their ransomware strategy to expose their target’s vulnerabilities.
Watch Video
Key Strategies for Meeting GDPR Compliance Requirements
White Paper
Key Strategies for Meeting GDPR Compliance Requirements
Key Strategies for Meeting GDPR Compliance Requirements
This white paper explains the key provisions of GDPR and why organizations need to take action today to achieve compliance before May 25, 2018, when steep penalties for non-compliance take effect.
Read White Paper