Investing in securing data at rest on servers, and over-the-wire encryption is vital, but unless the devices used to access data are also effectively secured, all other efforts might be in vain. Many organizations consider their most important IT assets to be the servers that process the data that the business couldn’t operate without, employing sophisticated defenses to provide protection, including products such as LepideAuditor Suite. But ignoring basic best practices for end-user Read more...

IT audits are never fun, but surviving an IT audit is largely just a matter of being able to give the auditors the information that they ask for and being able to prove that you are adhering to established procedure. Of course there are many different types of IT audits and each has its own unique nuances, but there are some general best practices that tend to apply across the board. Document Your Internal Procedures and Follow Them One of the keys to surviving an IT audit is to document all Read more...

One of the best ways to know what is happening within your organizational environment is through auditing. Windows Server 2012 Active Directory provides the option to monitor operations performed on the domain and log such information in the Event Viewer. It can log both the successful and failure operations, depending on the audit configuration. As an administrator, you can audit these logs to understand what action was performed by whom and when. Audit Account Management provides the Read more...

Microsoft has significantly enhanced its cloud portfolio with the release of Windows Azure Active Directory. Available in three editions—Free, Basic, and Premium—Azure AD starts where Windows Server AD leaves off, providing identity and access management capabilities for a wide range of applications and services across on-premises, hybrid, and cloud environments. With Azure AD, administrators can centrally manage users and groups, control what information is stored in the directory, Read more...

Welcome to a new world, where billions of objects are interconnected over public or private IP (Internet Protocol) networks, a virtual space where the data is regularly connected, analyzed, and used in order to initiate an action and offering a wealth of intelligence for planning, implementing, managing, and making better decisions. This is the world of Internet of Things (IoT). These “things” of the real world shall seamlessly integrate into the virtual world, thus enabling, anytime, Read more...

In the first part of this article, we created and enabled Dynamic Access control, configured claim types and also configured resource property list. In this part, we will continue with the configuration of Central Access Rule and configure Central Access Policy. Once Central Access Policy is configured, we need to create a new group policy to publish Central Access Rule and configure the shared folder with the necessary classifications. And then, finally verify the effective permission on Read more...

Not everything seems to be working right for Sony Corporation on the Cyber security front. The company has been once again attacked by the hackers and confidential company data and employees’ data has been left bare open for misuse. This particular incidence can result in massive loss for corporation, which could run into hundreds of millions. The point to note here is, if a corporation of the size of Sony is serially failing to protect against hackers, what small and medium size Read more...

LepideAuditor for File Server (LAFS) is a one-stop solution to audit the file servers in an organization. It audits the events of all files and folders on the server, including shared folder such as access, create, delete, modify, and copy. Easy-to-use interface lets a user add the File Server, create an audit policy, create a rule, and the auditing will be started instantly. It will show every change in the added file servers. You are free to add a specific drive or directory that you want Read more...

It’s time to sip up coffee, welcome the New Year, and sneak peek some of the top futuristic technology trends for the year 2015. It’s not the first time that these technologies have come up for discussion here; we have been flirting with the idea of implementing them throughout 2014 as well. As the worldwide IT and telecommunication spending goes into trillions of dollars, a significant portion of this will be covered by new technologies. Business decision makers would better do by Read more...

Well, you may think what security risk has to do with holiday season, but there exist a correlation, read on to know how! Most of the organizations small, medium and enterprise levels invest in security still many a time they find themselves at the receiving end. The reason could be, while they could be doing a lot at one end but they tend to ignore other security risks that they might be exposed to. In the light of this discussion it is quite logical to look at some of the major security Read more...