Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
Check out our recent webcast entitled, Preparing for the Disgruntled Privileged User — Three Ways They Can Hose Your Environment in Minutes with Brian Hymer, Strategic Systems Consultant and windows security expert, Randy Franklin Smith. Brian and…
Cyber security threats from external attackers are a constant worry for all organizations, as evidence by the many recent, headline-grabbing Ransomware data breaches such as WannaCry, Petya, Bad Rabbit.
However, today’s most damaging cyber security threats…
Our data and systems are frequently under attack these days. A more traditional attack is from external threats like viruses or hackers trying to gain access from outside of your environment. Threats from inside your environment are on the increase though…
A major release of Desktop Authority has been a long time coming. Here are just some of the exciting new features and enhancements included in the latest version:
Off-Network support for domain joined machines
Privilege Manager's application whitelisting abilities has finally met its match, and it's called Blacklisting...
What’s New in Privilege Manager for Windows 4.0?
Blacklist Feature
Co-Authored by Matt Nelson
Image Credit: Trev Grant | CC 2.0
YES! It’s October, and while most of you are using your in-laws’ wardrobe to decorate the front yard for Halloween and scare off (youth) intruders, we thought we’d let you know it is also National…
PSTs aren't pure evil. By making data personal, IT benefits with less data on the server so backups complete faster and require less storage.
However, without visibility to PSTs, security and compliance issues for your organization becomes a major concern…
GDPR establishes a number of key principles of data protection to be implemented for all EU residents. There is no escape from GDPR: organisations cannot outsource data processing to a non-EU country and thereby operate outside the auspices of GDPR. If…
This second blog in a series on the impact of GDPR on IT operations examines the IT requirements specified in or implied by the new regulation.
There are three main areas that IT operations must focus on in order to facilitate an organisation's compliance…
GDPR is a game-changer for the processing of personal data, but it also has substantial impact on IT operations more generally. This blog is the first in a short series that will explore some of the key areas where GDPR will have an impact on IT operations…
As the 50th anniversary of the Star Trek TV series looms, it’s interesting to think of the wisdom that can be shared from the many voyages of starship Enterprise as it went “where no man has gone before.” Remember “The Trouble with Tribbles” episode…
Enterprise Reporter provides a unified solution for data discovery and report generation. Using the Enterprise Reporter Configuration Manager, administrators can easily configure and deploy discoveries to collect and store data. Once the data has been…
Co-written with Priscilla Tenggara.
When it comes to Pokémon Go horror stories, we’ve heard it all - from trespassing, to injuries, to even robberies. It seems like the risk to users has no limit. Whether or not it’s intentional, users gaining access…
The cloud: the final frontier. These are the voyages of your enterprise. Its mission: to explore strange new technologies, to seek out innovation, to boldly go where your organization has never gone before.
I hope you’re as excited about the new Star…
It’s crazy - technology and business are moving faster than ever and you’re sprinting just to keep up. Meanwhile, your workday is wasted on tons of repetitive, day-to-day tasks. That’s why we hosted a Virtual Tradeshow.
The bad news…
Last year, the Quest team arrived in Chicago for Microsoft Ignite. While most folks on my team attended a few Microsoft events in the past, I did not know what to expect. Once I arrived to the event, I quickly submitted to the excitement of it all.
…