Security Whitepapers

Why it’s time to redefine endpoint management

IT environments are becoming more complicated, with remote employees accessing company data outside the safety of the traditional network and personal devices that may not be following company protocols. These endpoint devices can create security risks and compliance vulnerabilities that must be addressed consistently and with purpose. IT Managers often underestimate or even ignore the

Ultimate Cyber-Resiliency: a guide to combatting AD security villains

In the world of cyber security, Active Directory (AD) is key. Every organization’s Active Directory serves as a cornerstone, providing authentication and authorization for every critical resource across the environment. Suffice to say, ensuring that Active Directory is properly managed and secured is vital for continuity and success. Unfortunately, that’s easier said than done, considering

Be Prepared for Ransomware Attacks with Active Directory Disaster Recovery Planning

Devastating ransomware attacks on critical organizations and infrastructure like JBS and the Colonial Pipeline have escalated ransomware awareness to the highest levels. In fact, due to increasing geopolitical tensions, the Cybersecurity and Infrastructure Security Agency (CISA) has issued a “Shields Up” message to every U.S. organization, including federal agencies, urging them to adopt a heightened

Improving AD security through consolidation and modernization

Active Directory (AD) architecture plays an important role in keeping your organization safe from threats. It is important to ensure you keep up with AD compliance and security requirements as they change over time. If you have multiple AD environments or aging environments, it becomes more difficult to control your risk. Consider performing an AD

Quest Supply Chain Risk Management

The Microsoft Platform Management line of products earns a high level of trust from its customers as it performs critical administrative, auditing and security tasks directly within the customer’s environment. Therefore, in addition to our general efforts around Supply Chain management, Quest goes beyond the ordinary to also address the concern of insider threats head

A practical approach to cyber resiliency

Organizations today are keenly aware of the need to improve cybersecurity. However, finding an effective and efficient strategy for achieving that goal often feels elusive. Adversaries are constantly inventing new tactics and techniques, leaving IT scrambling to fight the latest fire. However, there is a practical way to get ahead of the onslaught of cyberattacks: