8 Steps for a Successful Teams Rollout

Posted by aeadmin on Jun 13, 2018 7:09:28 AM

 

In our last post we described the core features and capabilities of Microsoft Teams. The application serves as a hub for applications, document sharing and meetings, with a persistent threaded chat feature that keeps teams engaged and informed. Microsoft Teams can easily be customized to meet diverse needs and has advanced security features to protect sensitive data.

Read More

Tags: Technology, Microsoft, Teams

Microsoft Team Promises to Enhance Workplace Collaboration

Posted by aeadmin on Jun 6, 2018 1:13:00 PM

 

Almost 40 percent of employees will work remotely within 10 years, according to a recent survey by Upwork. Eighty-six percent of respondents said that escaping the confines of the office increases productivity by eliminating distractions and impromptu meetings.

Read More

Tags: Technology, Microsoft

Better Understanding of the SCCM SUP Process

Posted by aeadmin on Mar 16, 2018 10:52:06 AM

 

In a recent alert, the U.S. Computer Emergency Readiness Team (US-CERT) said that about 85 percent of successful security breaches involve systems that have not been patched. A recent study by research firm Voke Media found that 82 percent of security breaches since 2015 occurred due to unapplied patches that had been available for up to a year.

Read More

Tags: adaptivedge, SCCM, software update, Microsoft, SUP

Microsoft Tools for Managing Privileged Accounts, Part 2

Posted by aeadmin on Feb 27, 2018 9:08:39 AM

 

In Part 1 of this post, we examined how two Microsoft solutions, Privileged Access Workstation (PAW) and Local Administrator Password Solution (LAPS), protect privileged accounts and the data and applications they use. PAW is capable of distinguishing privileged administrative accounts from normal user accounts. When a privileged account is recognized, PAW creates a hardened physical environment for sensitive tasks while preventing high-risk activity. LAPS automatically generates, encrypts and randomizes passwords based on security policies and simplifies password management.

Read More

Tags: adaptivedge, cybersecurity, PAWS, identity management, privileged accounts

Microsoft Tools for Securing and Managing Privileged Accounts, Part 1

Posted by aeadmin on Feb 9, 2018 6:32:35 AM

 

In a previous post, we discussed how to protect privileged accounts using robust identity management and authentication mechanisms to control access to company resources on a more granular level. We introduced three tools from Microsoft that can keep privileged accounts from being compromised – Microsoft Privileged Access Workstation (PAW), Local Administrator Password Solution (LAPS) and Privileged Access Management (PAM). In this post, we’ll take a deeper dive into PAW and LAPS.

Read More

Tags: adaptivedge, PAWS, LAPS, identity management, privileged accounts

Preventing Sensitive Data from Seeping through the Cracks

Posted by aeadmin on Feb 5, 2018 6:00:00 AM

 

Over the last several posts, we’ve been discussing the need for a modern security strategy that protects the “identity perimeter” with special emphasis on securing privileged accounts. We also explained how user and entity behavior analytics can break the cyberattack chain by identifying and mitigating insider threats and compromised user credentials.

Read More

Tags: adaptivedge, cybersecurity, identity management, privileged accounts, data loss prevention, identity perimeter

To Break the Cyberattack Chain, You Need the Right Tools

Posted by aeadmin on Jan 29, 2018 7:00:00 AM

 

In the military, the term “attack chain” or “kill chain” is used to describe how an attack is structured and executed, from identification of a target to selection of an appropriate weapon to the use of that weapon on the target. Reconnaissance operations are employed throughout the chain to monitor the movement and defense capabilities of the target and evaluate the impact of the attack.

Read More

Tags: adaptivedge, cybersecurity, identity, phishing, UEBA, cyberattack, security

Tools and Techniques for Protecting Privileged Accounts

Posted by aeadmin on Dec 28, 2017 1:35:06 PM


In our last post, we explained that identity has become the new perimeter in today’s cloud-based, mobile-enabled environment. It’s no longer possible to maintain IT assets and applications behind a firewall. Organizations must implement robust identity management and authentication mechanisms to ensure that only authorized users gain access to resources.

Read More

Tags: Active Directory, adaptivedge, Azure, cybersecurity, privileged accounts, Microsoft

How Azure Active Directory Premium Helps Secure the Identity Perimeter

Posted by aeadmin on Dec 15, 2017 10:00:00 AM

 

The days when users accessed corporate applications and data via desktops at the office are long past. Mobile devices enable anytime, anywhere access to both internal and cloud-based resources. The traditional network perimeter no longer exists.

Read More

Tags: Active Directory, adaptivedge, microsoft azure, cybersecurity, Microsoft, security

Yesterday’s Cybersecurity Strategy Is Ineffective Today

Posted by aeadmin on Dec 1, 2017 8:59:47 AM


Cybersecurity is a top priority for organizations. According to IDG’s 2017 State of the CIO Report, 32 percent of CEOs want their CIOs to focus on upgrading the IT security infrastructure. That’s the same number that are wanting their CIOs to help drive revenue growth. What’s more, 51 percent of survey respondents said their cybersecurity strategy and overall IT strategy were tightly integrated. On average, 12 percent of the IT budget is earmarked for cybersecurity.

Read More

Tags: adaptivedge, Azure, microsoft azure, cybersecurity