If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend.
Here’s one Active Directory best practices session you won’t want to miss!…
If you’re attending Microsoft Ignite in Orlando, it’s about that time to dive into the MyIgnite Schedule Builder to select the sessions you want to attend.
Here’s one Active Directory best practices session you won’t want to miss!…
Active Directory is at the heart of it all, providing authentication and authorization for critical resources across your on-premises, cloud and hybrid IT environments. Whether you’re running AD, Azure AD or both, Quest has the deep expertise you need…
Does your disaster recovery plan focus on recovery? That’s a great starting point, but many experts say recovery should actually be a last resort. The ideal would be to take steps to avoid catastrophe in the first place.
It’s tough, though. IT…
Are you facing endpoint management challenges in your organization? A lot of IT administrators are struggling with the proliferation of IT devices. Employees not only use company-owned computers and laptops to do their work but also smartphones, tablets…
Remember the days when all you had to worry about were people’s hard-wired desktop PCs? Oh, how simple things were back then. Even if you don’t remember those days, it’s likely that your IT world has gotten more complex in the past few years as a wide…
Have you upgraded your organization to Windows 10 yet?
Many IT administrators struggle to manage the proliferation of endpoints, safeguard their network against cyberthreats and maintain compliance standards. Upgrading to Windows 10 adds another layer…
You are probably aware that cyber attacks are increasing dramatically every year, but have you actually looked at the numbers? They are truly staggering. For example, Symantec’s 2018 Internet Security Threat Report found that:
Quest InTrust 11.3.2 maintenance release happened last week. One of the main features is improved and expanded support for Linux OS. Let me focus on this topic and provide some details about how InTrust can be used to setup truly centralized and feature…
Has your company been hit by ransomware yet? How about other types of malware? Phishing scams, drive-by downloads or pass-the-hash attacks? If you haven’t already, you probably will be soon.
What do all these attacks have in common? They start…
Here’s a broken record: Increasing IT complexity is making your job more and more challenging. While new technologies, added devices and virtualized systems are making leaps and bounds in terms of the possibilities for business, IT resources to manage…
This February 13-17, I’ll make my annual pilgrimage to San Francisco for the RSA Security Conference. And while I look forward to the ever-present long hours working the booth, the short walk from the hotel to the exhibit hall, runs along the wharf in…
Being an IT administrator can be an enjoyable, rewarding job. So is parenting, for that matter. But being an IT administrator can also be incredibly stressful with frequent hair-pulling moments. Again, those amongst us that are parents no doubt share…
It’s hard to capture the essence of UserKon 2018 in a blog but I will give it a whirl!
Check out the highlight video as it gives you a flavour of the activities that took place over the week.
UserKon was fantastic from start to finish from the beignet…
It’s now status quo: Your users probably have at least one, if not more, of their own devices that they use to access company resources and get work done. They log into your network, check email and even edit documents using their smartphones, tablets…
Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
Still avoiding Windows 10 because it seems like such a hassle to manage the ongoing, bandwidth-clogging updates? Here’s some news that may put a spring in your step.
The Unified Update Platform, an emerging Microsoft technology in testing now with…
Currently 30% of companies in the United States are using the NIST Cybersecurity Framework to manage risks with projections of 50% by the year 2020 (https://iapp.org/news/a/the-future-of-the-nist-cybersecurity-framework/).
Quest has a broad portfolio…
In the early days of Active Directory, a decision had to be made as to whether you were going to do an in-place upgrade of your existing Windows NT 4.0 environment, or if you were going to do a “greenfield” migration. Some organizations had multiple…
I read all sorts of security blogs, and the comments I see to articles about staying ahead of the latest Windows OS and third-party security updates attest to the challenge of keeping systems up to date: “Great — another blue screen of death I will need…
Where are we headed with endpoint management now that telecommuting and mobile devices are status quo — and ever increasing in number — in the workplace? Device and data management has become more challenging than we could have ever dreamed…
When you hear “endpoint protection” and “endpoint security,” do you think of your traditional devices, like PCs, printers and network devices? Or do you think of mobile device security for smartphones, tablets and whatever is coming…