Microsoft has significantly enhanced its cloud portfolio with the release of Windows Azure Active Directory. Available in three editions—Free, Basic, and Premium—Azure AD starts where Windows Server AD leaves off, providing identity and access management capabilities for a wide range of applications and services across on-premises, hybrid, and cloud environments. With Azure AD, administrators can centrally manage users and groups, control what information is stored in the directory, Read more...

Welcome to a new world, where billions of objects are interconnected over public or private IP (Internet Protocol) networks, a virtual space where the data is regularly connected, analyzed, and used in order to initiate an action and offering a wealth of intelligence for planning, implementing, managing, and making better decisions. This is the world of Internet of Things (IoT). These “things” of the real world shall seamlessly integrate into the virtual world, thus enabling, anytime, Read more...

In the first part of this article, we created and enabled Dynamic Access control, configured claim types and also configured resource property list. In this part, we will continue with the configuration of Central Access Rule and configure Central Access Policy. Once Central Access Policy is configured, we need to create a new group policy to publish Central Access Rule and configure the shared folder with the necessary classifications. And then, finally verify the effective permission on Read more...

Not everything seems to be working right for Sony Corporation on the Cyber security front. The company has been once again attacked by the hackers and confidential company data and employees’ data has been left bare open for misuse. This particular incidence can result in massive loss for corporation, which could run into hundreds of millions. The point to note here is, if a corporation of the size of Sony is serially failing to protect against hackers, what small and medium size Read more...

LepideAuditor for File Server (LAFS) is a one-stop solution to audit the file servers in an organization. It audits the events of all files and folders on the server, including shared folder such as access, create, delete, modify, and copy. Easy-to-use interface lets a user add the File Server, create an audit policy, create a rule, and the auditing will be started instantly. It will show every change in the added file servers. You are free to add a specific drive or directory that you want Read more...

It’s time to sip up coffee, welcome the New Year, and sneak peek some of the top futuristic technology trends for the year 2015. It’s not the first time that these technologies have come up for discussion here; we have been flirting with the idea of implementing them throughout 2014 as well. As the worldwide IT and telecommunication spending goes into trillions of dollars, a significant portion of this will be covered by new technologies. Business decision makers would better do by Read more...

Well, you may think what security risk has to do with holiday season, but there exist a correlation, read on to know how! Most of the organizations small, medium and enterprise levels invest in security still many a time they find themselves at the receiving end. The reason could be, while they could be doing a lot at one end but they tend to ignore other security risks that they might be exposed to. In the light of this discussion it is quite logical to look at some of the major security Read more...

Dynamic Access Control (DAC) is a new feature introduced in Windows Server 2012 and Windows 8. It allows to apply access control and restricted permission based conditional rules for accessing files and folders dynamically. For Example, if a new user joins a department or if an employee moves from one department to another department or his role changes, then the file and folder permissions changes are dynamically added and removed without the administrator’s intervention. However, it Read more...

Cyber-criminals are becoming more adept at stealing credit card information all the time. Organizations that handle or process card data in any capacity must take the necessary precautions to protect that data. At the very least, they should ensure they’re in compliance with the Payment Card Industry Data Security Standard (PCI DSS), developed to encourage and enhance cardholder data security across the globe. The PCI DSS defines 12 requirements that companies should follow if they handle Read more...

Lepide is offering Up To 50% discount on the occasion of “Black Friday & Cyber Monday 2014″ on following software. Lepide Exchange Recovery Manager Lepide Active Directory Self Service Lepide Active Directory Cleaner Lepide User Password Expiration Reminder LepideMigrator for Documents Offer is valid from 1st Dec’2014 to 5th Dec’2014 For complete details, contact sales@lepide.com, keep the subject line as, “Black Friday & Cyber Monday 2014 offer from Read more...