08.26.2016 , Security, by .

July and August carried on the trend in 2016 of an increased amount of awareness and attention being placed on IT security threats – both from the inside and outside. It has emerged that external security breaches affected high profile organisations such as Amazon, HSBC and the UK railway network. But as the focus on defending against external breaches increases, can the same be said of internal threats? Here’s a … Read more

08.23.2016 , Change Auditing, Auditing, by .

The role of the IT department is multifaceted and constantly evolving. One are that has remained a very important part of the IT department’s role is the regular auditing of critical IT systems. Regular, in-depth auditing helps to streamline systems management, strengthen security and meet regulatory compliance mandates. Given below is a list of points, based on the US government’s NIST (National Institute of Standards and Technology) Cyber Security framework … Read more

08.10.2016 , Exchange Server, by .

Microsoft recently launched the new beta version of the Exchange 2016 messaging platform – packed with exclusive features and enhancements to help improve the platform. Here we will take you through what’s new about Exchange 2016 and compare it to the commonly used Exchange 2013. 1. Redesigned Exchange 2016 vs Exchange 2013 Architecture The Exchange 2016 architecture has been redesigned in order to ensure efficient hardware utilization, failure isolation and … Read more

08.03.2016 , File Server Auditor, Auditing, by .

This tutorial explains the steps of performing Current Permission Analysis of the shared files and folders using LepideAuditor Suite for File Server . It offers customizable auditing, dedicated Radar Tab with graphical representation of Audit Data, predefined audit report, Historical Permission Analysis, and Current Permission Reports. When it comes to current permissions, it provides a detailed report of all the permission related data including change in applied permissions by folder, … Read more

07.29.2016 , General, by .

As you may or may not know, today is SysAdmin Day! In order to celebrate Sys Admins from all over the world we asked some of you on Spiceworks and LinkedIn what qualities you need if you want to survive in the world of system administration. Here 5 things you thought were important: 1. Patience Being a System Administrator often means completing tasks that require time and concentration. Sometimes you … Read more

07.20.2016 , Change Auditing, Auditing, Active Directory, by .

Anyone in charge of regularly auditing their organization’s Active Directory knows how difficult it can be to log, filter and recover event details from mountains of raw log data. If you’re reading this, then it is likely that you have decided to go for an automated solution to make things easier. There are many solutions on the market that claim to do similar things so it is important that you … Read more

07.15.2016 , SharePoint, by .

SharePoint 2016 is finally out in beta and showcases some new features and enhancements. Its main focus is to make integration with cloud-based Office 365 services much easier. This release will be most useful to those users who have not yet moved to the cloud and give them the chance to make use of cloud technology. Here are 12 significant updates provided in SharePoint 2016: 1. App launcher and UI … Read more

07.11.2016 , Security, by .

Whilst many organizations give high priority to protecting themselves against outside security threats like hackers, a high proportion aren’t even aware that they may be at risk from the inside. When employees, ex-employees, business partners or associates leak, sell, or manipulate sensitive information either by accident or maliciously the organization may suffer. Financial losses and reputation may get affected irreparably, especially if the information contains intellectual property, business secrets, and … Read more

06.22.2016 , General, Security, by .

A few weeks ago, InfoSecurity – Europe’s largest Information Security industry event – took place in London and we at Lepide exhibited our auditing and monitoring solution for the first time. Now that we have had time to collect our thoughts we thought it would be a good idea to share what we learnt from talking to some of the industry’s experts. What we learnt is that, despite evidence of … Read more

06.03.2016 , Exchange Server, Migration, by .

With any type of migration there are numerous factors that must be considered before you start. You need to know how the migration will affect the resources of your IT department, whether there will be any downtime and what the most appropriate migration method is. Many organisations decide to deploy third-party solutions to help automate and speed up the migration process – but are they necessary? The most common aspects … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2016 Lepide Software Private Limited. All Trademarks Acknowledged.