Find out how to successfully complete your Office 365 migration, and manage your Office 365 environment. Learn from Quest customers about their experiences in this discussion.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
Triggered by the corona virus lock down, the abrupt transition to a work from home ( W F H) venue forced organizations to scramble to support a larger remote workforce. Such a quick shift means that certain security measures and requirements inevitably fell by the wayside. At the same time, cybercriminals found a new opportunity for attack with remote workers and improperly secured connections and technologies. Together, these trends have created a more vulnerable environment affecting the cyber security defenses of many organizations.
How to Extend Security and Compliance Within BoxElastica Inc.
Choosing an enterprise-class file sharing service such as Box is a great first step in safely migrating to the cloud. However even with the most robust service, enterprise organizations are still responsible for how their users take advantage of the service, what sensitive content they upload and share, and potential damage due to compromised user credentials.
In this on-demand webcast Eric Andrews, Elastica VP of Marketing, will discuss:
• What base level security Box provides
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
A keynote presentation I gave for BELTUG in June 2015 based on ISACA research on cloud computing security and based on experiences in industry with proper references to SMALS, ISACA, ENISA, CSA and NIST
presentation given at the ISACA EuroCACS 2015 conference in Copenhagen on why organisations should apply Privacy by Design in their Internet of Everything solutions.
How to Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breeches, While Making Use of Multiple Devices That Only Require Light Touch Management
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
Weisen Li, Senior Business Development Manager, Box
A seismic shift in the nature of work not seen since the invention of the PC is taking place. Now that 60% of employees access, manage and share company content away from their desks, a tidal wave of Internet-connected devices and cloud applications are being ported into the office at an ever-increasing rate. But how can enterprises balance the demands of workers to be more mobile with operational efficiency and security? The answer is the cloud. Cloud software provides users with the flexibility and mobility they need to work faster and better, while freeing IT from the challenges of managing technology and enabling them to focus on driving the productivity, security and scalability their companies need over the long term. In a cloud world, technology decision-makers are no longer playing the role of IT enforcer. Instead, they are leveraging the cloud to develop business insights and and break new ground in managing their companies' information strategically.
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
Triggered by the corona virus lock down, the abrupt transition to a work from home ( W F H) venue forced organizations to scramble to support a larger remote workforce. Such a quick shift means that certain security measures and requirements inevitably fell by the wayside. At the same time, cybercriminals found a new opportunity for attack with remote workers and improperly secured connections and technologies. Together, these trends have created a more vulnerable environment affecting the cyber security defenses of many organizations.
How to Extend Security and Compliance Within BoxElastica Inc.
Choosing an enterprise-class file sharing service such as Box is a great first step in safely migrating to the cloud. However even with the most robust service, enterprise organizations are still responsible for how their users take advantage of the service, what sensitive content they upload and share, and potential damage due to compromised user credentials.
In this on-demand webcast Eric Andrews, Elastica VP of Marketing, will discuss:
• What base level security Box provides
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
A keynote presentation I gave for BELTUG in June 2015 based on ISACA research on cloud computing security and based on experiences in industry with proper references to SMALS, ISACA, ENISA, CSA and NIST
presentation given at the ISACA EuroCACS 2015 conference in Copenhagen on why organisations should apply Privacy by Design in their Internet of Everything solutions.
How to Cut IT Costs and Boost Productivity WITHOUT Exposing Your Company to Security Breeches, While Making Use of Multiple Devices That Only Require Light Touch Management
CIS13: The Power of the Cloud and Transformation in the EnterpriseCloudIDSummit
Weisen Li, Senior Business Development Manager, Box
A seismic shift in the nature of work not seen since the invention of the PC is taking place. Now that 60% of employees access, manage and share company content away from their desks, a tidal wave of Internet-connected devices and cloud applications are being ported into the office at an ever-increasing rate. But how can enterprises balance the demands of workers to be more mobile with operational efficiency and security? The answer is the cloud. Cloud software provides users with the flexibility and mobility they need to work faster and better, while freeing IT from the challenges of managing technology and enabling them to focus on driving the productivity, security and scalability their companies need over the long term. In a cloud world, technology decision-makers are no longer playing the role of IT enforcer. Instead, they are leveraging the cloud to develop business insights and and break new ground in managing their companies' information strategically.
We are witnessing an onslaught of attacks coming in from highly organized cybercriminals. It is so bad, in fact, that the situation was recently described by U.S. Secretary of State, John Kerry as, “…pretty much the wild west…”.
By United Security Providers
Office 365 revolutionized how employees work and collaborate by embracing the power of the software-as-a-service (SaaS) model. While the easy deployment and broad access of Office 365 makes it invaluable to business productivity, a SaaS model adds increased risk of malicious or accidental leakage of business-critical data.
In this webinar Protect Your Data in Office365 you will learn to:
Understand how Office 365 is being used by your users
Identify sensitive content (like payment information, healthcare records, source code, or other types of data) being shared
Uncover risky or anomalous behavior by rogue insiders
Automate protection against Office 365 data breaches, minimize false positives, and eliminate the constant retuning of data classification policies.
Watch the on-demand webcast at https://www.elastica.net/protect-your-data-in-office365/
Box has revolutionized how employees can access, share and manage company data and collaborate more effectively. But while the distributive nature of cloud based file sharing makes it invaluable to business productivity, it also adds increased risk of malicious or accidental leakage of business-critical data.
Today’s cloud sharing services like Box require a complete rethinking of traditional security practices to ensure proper access control, security, and compliance as corporate assets migrate outside the enterprise boundary into 3rd party cloud apps. Implementing these security practices starts with gaining visibility into how cloud apps are being used by employees, identifying sensitive content and how it is being shared, uncovering risky or anomalous behavior, and proactively enforcing policies to protect against internal or external threats.
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
Independent lab MRG-EFFITAS looked at a number of consumer backup software solutions and concluded that Acronis True Image 2017 New Generation was the best in terms of backup speed, protection from ransomware, ease of use, and features. This slideshare shows highlights from this independent report and provides a link to the full report.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis
In the wake of the massive "WannaCry" ransomware attack that took the world by storm on Friday, May 12, businesses are scrambling to improve their IT security. Learn how Acronis Active Protection can help prevent another attack like this one from knocking your business offline.
Seclore Rights Management integrates with Microsoft 365 to help organizations protect sensitive data shared internally between users and user groups by deriving permissions from SharePoint Online or adding predefined permission policies to documents
Productivity and Security with Microsoft 365 and the Modern DesktopDavid J Rosenthal
Microsoft 365 Enterprise is a complete, intelligent solution, which brings together the best of Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
Google Apps, Especially Google Drive, have enabled millions of users to easily share documents and collaborate more effectively. However, a lack of visibility and control by IT departments over these users and their activity in Google Apps has actually dramatically increased the risk of malicious or accidental leakage of business-critical data.
In this webcast, cloud security experts Nitin Kumar of Cisco, and Sergio Castro of Elastica will discuss best practices for protecting your data in Google Apps. You will learn:
• What base level security Google Drive provides (and what it doesn’t)
• Examples of companies that are facing these issues and how they are solving them
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
• How to automate protection against Google Drive data breaches
Threat modeling is a way of viewing the world, and so what's changing in threat modeling reflects that. There's a global pandemic. The ways we build software are changing. The threats are evolving, and attacks through systems are growing in importance.
Elastica conducted an exhaustive analysis of over 100 million customer files in order to better understand how employees use (and occasionally abuse) file sharing apps. This data has been anonymized and aggregated and, for the first time ever, sheds some much-needed light on typical file sharing behaviors, the nature of the data being shared, including unmanaged “shadow data”, and the possible consequences of file sharing data breaches for organizations like yours.
This slideshare, “Shadow Data Exposed”, delves deeply into this research data to help you unlock the business potential of cloud sharing apps and uncover and manage the “Shadow Data” stored in them, while ensuring these apps are used safely and in compliance with your corporate policy. You will learn:
• Why traditional security technologies like DLP, firewalls, endpoint solutions and antivirus are ineffective in the brave new world of file sharing apps.
• How to spot 7 risks of managing file sharing apps, as revealed by Elastica’s big security data research.
• How to build an effective cloud app security architecture that provides visibility, control and remediation.
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
Introducing Windows 10 Enterprise E3 for CSP
More than 350 million active devices are running Windows 10 and our business customers are moving faster than ever before, with more than 96% of them in active pilots. And, Windows 10 customers are already experiencing improved productivity and cost savings with an average ROI of 188% with a 13-month payback.*
In most instances, organizations are moving quickly to Windows 10 due to the heightened security risks they face and the industry-leading security features in Windows 10 that can help protect them. Companies of all sizes face real security threats from sophisticated hackers and cyber-terrorists, costing an average of $12 million an incident. In the US alone there are more than 56 million small to mid-sized businesses, in critical sectors like healthcare, legal and financial services that need strong security similar to what our large enterprise customers get through volume licensing agreements.
Partners can now offer their business customers the ‘full IT stack’ from Microsoft, including Windows 10, Office 365, Dynamics Azure and CRM as a per user, per month offering through a single channel, which businesses can scale up or down as their needs change. Key features include:
Increased Security: Offering the sophisticated security features of Windows 10 to help businesses secure sensitive data and identities, help ensure devices are protected from cybersecurity threats, give employees the freedom and flexibility to access sensitive data on a variety of devices, and help ensure controlled access to highly-sensitive data.
Simplified Licensing & Deployment: Helping businesses lower up-front costs, eliminating the need for time-consuming device counting and audits, and making it easier to stay compliant with a subscription-based, per-user licensing model. This new offering allows businesses to easily move from Windows 10 Pro to Windows 10 Enterprise E3 without rebooting.
Partner-managed IT: Configuring and managing devices by a partner experienced in Windows 10 and cloud deployments. Partners can also help businesses develop a device security and management strategy with the unique features of Windows 10. Businesses can view subscriptions and usage for Windows 10 Enterprise, and any other Microsoft cloud services purchased, in their partner portal for easier management with one contract, one user account, one support contact, and one simplified bill.
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
In this on-demand webinar, we've discussed:
- Key takeaways on Shadow IT you need to know to protect your data in the cloud.
- Surprising Shadow IT statistics are disclosed and how to proactively take charge.
- Recommendations on cloud management strategies.
The panelists include renowned security experts Chenxi Wang - former Principal Analyst at Forrester Research, Rob McGillen - CIO for Grant Thornton, and Paul Simmonds - former Global CISO for AstraZeneca.
***Please Note: The link to the recorded on-demand webinar is on the last slide.
Storage Made Easy Cloud Control Gateway Overviewjimliddle
Storage Made Easy Cloud Control Gateway enables companies to unify and protect cloud data in addition to securely providing a way to share private data.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street, even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
Mediante el uso del marco de perímetro digital seguro, implementando un modelo “defense-in depth” se logrará la continuidad de las operaciones para evitar que los ataques maliciosos afecten las mismas y proporcionar resiliencia de acceso seguro y de red durante interrupciones, desastres naturales y calamidades. Esto permite a la fuerza de trabajo reanudar rápidamente industrias de actividades críticas y esenciales.
Understand the concepts of the NIST Zero Trust Architecture (ZTA). We will use a parenting analogy and show how it applies to protecting file as an enterprise resource.
With constant security threats like spyware and phishing, its important that you keep on top of your digital security. Check this piece out to find ways that you can ensure that your company's digital defenses are fortified.
We are witnessing an onslaught of attacks coming in from highly organized cybercriminals. It is so bad, in fact, that the situation was recently described by U.S. Secretary of State, John Kerry as, “…pretty much the wild west…”.
By United Security Providers
Office 365 revolutionized how employees work and collaborate by embracing the power of the software-as-a-service (SaaS) model. While the easy deployment and broad access of Office 365 makes it invaluable to business productivity, a SaaS model adds increased risk of malicious or accidental leakage of business-critical data.
In this webinar Protect Your Data in Office365 you will learn to:
Understand how Office 365 is being used by your users
Identify sensitive content (like payment information, healthcare records, source code, or other types of data) being shared
Uncover risky or anomalous behavior by rogue insiders
Automate protection against Office 365 data breaches, minimize false positives, and eliminate the constant retuning of data classification policies.
Watch the on-demand webcast at https://www.elastica.net/protect-your-data-in-office365/
Box has revolutionized how employees can access, share and manage company data and collaborate more effectively. But while the distributive nature of cloud based file sharing makes it invaluable to business productivity, it also adds increased risk of malicious or accidental leakage of business-critical data.
Today’s cloud sharing services like Box require a complete rethinking of traditional security practices to ensure proper access control, security, and compliance as corporate assets migrate outside the enterprise boundary into 3rd party cloud apps. Implementing these security practices starts with gaining visibility into how cloud apps are being used by employees, identifying sensitive content and how it is being shared, uncovering risky or anomalous behavior, and proactively enforcing policies to protect against internal or external threats.
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
Independent lab MRG-EFFITAS looked at a number of consumer backup software solutions and concluded that Acronis True Image 2017 New Generation was the best in terms of backup speed, protection from ransomware, ease of use, and features. This slideshare shows highlights from this independent report and provides a link to the full report.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis
In the wake of the massive "WannaCry" ransomware attack that took the world by storm on Friday, May 12, businesses are scrambling to improve their IT security. Learn how Acronis Active Protection can help prevent another attack like this one from knocking your business offline.
Seclore Rights Management integrates with Microsoft 365 to help organizations protect sensitive data shared internally between users and user groups by deriving permissions from SharePoint Online or adding predefined permission policies to documents
Productivity and Security with Microsoft 365 and the Modern DesktopDavid J Rosenthal
Microsoft 365 Enterprise is a complete, intelligent solution, which brings together the best of Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.
Google Apps, Especially Google Drive, have enabled millions of users to easily share documents and collaborate more effectively. However, a lack of visibility and control by IT departments over these users and their activity in Google Apps has actually dramatically increased the risk of malicious or accidental leakage of business-critical data.
In this webcast, cloud security experts Nitin Kumar of Cisco, and Sergio Castro of Elastica will discuss best practices for protecting your data in Google Apps. You will learn:
• What base level security Google Drive provides (and what it doesn’t)
• Examples of companies that are facing these issues and how they are solving them
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
• How to automate protection against Google Drive data breaches
Threat modeling is a way of viewing the world, and so what's changing in threat modeling reflects that. There's a global pandemic. The ways we build software are changing. The threats are evolving, and attacks through systems are growing in importance.
Elastica conducted an exhaustive analysis of over 100 million customer files in order to better understand how employees use (and occasionally abuse) file sharing apps. This data has been anonymized and aggregated and, for the first time ever, sheds some much-needed light on typical file sharing behaviors, the nature of the data being shared, including unmanaged “shadow data”, and the possible consequences of file sharing data breaches for organizations like yours.
This slideshare, “Shadow Data Exposed”, delves deeply into this research data to help you unlock the business potential of cloud sharing apps and uncover and manage the “Shadow Data” stored in them, while ensuring these apps are used safely and in compliance with your corporate policy. You will learn:
• Why traditional security technologies like DLP, firewalls, endpoint solutions and antivirus are ineffective in the brave new world of file sharing apps.
• How to spot 7 risks of managing file sharing apps, as revealed by Elastica’s big security data research.
• How to build an effective cloud app security architecture that provides visibility, control and remediation.
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
Introducing Windows 10 Enterprise E3 for CSP
More than 350 million active devices are running Windows 10 and our business customers are moving faster than ever before, with more than 96% of them in active pilots. And, Windows 10 customers are already experiencing improved productivity and cost savings with an average ROI of 188% with a 13-month payback.*
In most instances, organizations are moving quickly to Windows 10 due to the heightened security risks they face and the industry-leading security features in Windows 10 that can help protect them. Companies of all sizes face real security threats from sophisticated hackers and cyber-terrorists, costing an average of $12 million an incident. In the US alone there are more than 56 million small to mid-sized businesses, in critical sectors like healthcare, legal and financial services that need strong security similar to what our large enterprise customers get through volume licensing agreements.
Partners can now offer their business customers the ‘full IT stack’ from Microsoft, including Windows 10, Office 365, Dynamics Azure and CRM as a per user, per month offering through a single channel, which businesses can scale up or down as their needs change. Key features include:
Increased Security: Offering the sophisticated security features of Windows 10 to help businesses secure sensitive data and identities, help ensure devices are protected from cybersecurity threats, give employees the freedom and flexibility to access sensitive data on a variety of devices, and help ensure controlled access to highly-sensitive data.
Simplified Licensing & Deployment: Helping businesses lower up-front costs, eliminating the need for time-consuming device counting and audits, and making it easier to stay compliant with a subscription-based, per-user licensing model. This new offering allows businesses to easily move from Windows 10 Pro to Windows 10 Enterprise E3 without rebooting.
Partner-managed IT: Configuring and managing devices by a partner experienced in Windows 10 and cloud deployments. Partners can also help businesses develop a device security and management strategy with the unique features of Windows 10. Businesses can view subscriptions and usage for Windows 10 Enterprise, and any other Microsoft cloud services purchased, in their partner portal for easier management with one contract, one user account, one support contact, and one simplified bill.
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
In this on-demand webinar, we've discussed:
- Key takeaways on Shadow IT you need to know to protect your data in the cloud.
- Surprising Shadow IT statistics are disclosed and how to proactively take charge.
- Recommendations on cloud management strategies.
The panelists include renowned security experts Chenxi Wang - former Principal Analyst at Forrester Research, Rob McGillen - CIO for Grant Thornton, and Paul Simmonds - former Global CISO for AstraZeneca.
***Please Note: The link to the recorded on-demand webinar is on the last slide.
Storage Made Easy Cloud Control Gateway Overviewjimliddle
Storage Made Easy Cloud Control Gateway enables companies to unify and protect cloud data in addition to securely providing a way to share private data.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street, even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
Mediante el uso del marco de perímetro digital seguro, implementando un modelo “defense-in depth” se logrará la continuidad de las operaciones para evitar que los ataques maliciosos afecten las mismas y proporcionar resiliencia de acceso seguro y de red durante interrupciones, desastres naturales y calamidades. Esto permite a la fuerza de trabajo reanudar rápidamente industrias de actividades críticas y esenciales.
Understand the concepts of the NIST Zero Trust Architecture (ZTA). We will use a parenting analogy and show how it applies to protecting file as an enterprise resource.
With constant security threats like spyware and phishing, its important that you keep on top of your digital security. Check this piece out to find ways that you can ensure that your company's digital defenses are fortified.
Our end-to-end, integrated portfolio of cloud solutions across Microsoft 365, Dynamics 365, and Azure is built on a foundation of security and privacy and helps every organization in every industry build resilience and improve the bottom line.
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
The Briefing Room with Malcolm Chisholm and Druva
Live Webcast on June 9, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=baf82d3835c5dfa63202dcbe322a3ad7
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
Visit InsideAnalysis.com for more information.
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
The Briefing Room with Malcolm Chisholm and Druva
Live
The emergence of the mobile workforce has left an indelible mark on the enterprise; every employee is now mobile, and business data continues to be dispatched to the far reaches of the enterprise. While this has added enormous opportunity for increased productivity, it has also muddied the waters when it comes to controlling and protecting valuable data assets. As companies quickly evolve to address the new set of challenges posed by this shift in data usage, IT must ensure that all data, no matter where it’s generated or stored, is available and governed just as if it were still safely behind the corporate firewall.
Register for this episode of The Briefing Room to hear veteran Analyst Malcolm Chisholm as he explains the myriad challenges that mobile data introduces when addressing regulations and compliance needs, requiring new approaches to data governance. He’ll be briefed by Dave Packer of Druva, who will outline his company’s converged data protection strategy, which brings data center class capabilities to backup, availability and governance for the mobile workforce. He will share strategies to meet regional data residency, data recovery, legal hold and eDiscovery requirements and more.
"In this issue of “The 10 Most Trusted Companies in
Enterprise Security” Insights Success has shortlisted
those enterprise security providers which are providing
solutions that are systematically profile and
contextualize security threats with a level of detail and
granularity that has never been achieved before."
Office 365 Security - Its 2am do you know whos in your office 365Jack Nichelson
You’ve entrusted all of your company’s data to Microsoft’s cloud…what could go wrong? In 2018 you’ve either moved your data to Office365, you’re thinking about it, or you’ve locked your entire business into Lotus Notes. As cloud providers eat away traditional infrastructure, IT and Security teams must either adapt to this brave new world, or be left behind. In this talk we will provide real-world examples and how to apply both traditional and new security controls/tools to secure Office 365 & Azure. We will give specific, actionable recommendations you can make to your Microsoft Office 365 and Azure tenants. Recommendations like how to prevent external threats like account takeovers, internal threats like Shadow cloud Apps, effective monitoring and processes to follow to minimize the likelihood that your company becomes the Next Big Breach. The new perimeter is identities in the cloud, so learn to protect them with Azure Active Directory.
Microsoft 365, formerly known as Office 365, is an extensive productivity suite that offers a wide range of tools and applications to help users work from anywhere around the globe at any time.
Here are 5 ways how it facilitates better remote working
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioQuest
Deadlocks strike fear into the heart of even seasoned DBAs-- but they don't have to! In this session, you will get the code to cause a sample deadlock in SQL Server. You'll see how to interpret the deadlock graph to find out where the conflict lies, and how to design an index to make the deadlock disappear. You'll leave the session with the steps you need to confidently tackle future deadlocks.
As if your relational databases weren’t enough to handle, now you’ve got open source and non-relational databases on your plate, too. With so much at stake, it’s time to tap into your hidden super powers as you discover an easy way to centralize monitoring and management – across your entire database environment. In this session, you’ll see how to: - Centralize visibility into the health and status of MySQL (including MariaDB), PostgreSQL, MongoDB and Cassandra. - Get alerts for critical problems in your database environment. - Diagnose both real-time and historical performance problems. - Report on database availability and health.
SQL Server 2017 Enhancements You Need To KnowQuest
In this session, database experts Pini Dibask and Jason Hall reveal the lesser-known features that’ll help you improve database performance in record time.
Top 10 Enterprise Reporter Reports You Didn't Know You NeededQuest
With almost 300 built-in reports, Enterprise Reporter is an invaluable solution for admins seeking visibility into their Microsoft environments, both on-premises and Office 365. But, with so many reports available, sometimes it’s hard to know where to start.
Check out these slides from our Enterprise Reporter experts panel discussion where they’ll reveal their top 10 reports for on-premises, hybrid and cloud environments.
Plus, see how scheduled report delivery makes it easier for key stakeholders to stay informed and ahead of security risks.
Watch the Top 10 Enterprise Reporter Reports You Didn’t Know You needed: http://ow.ly/dqB330gErO7
Migrating to Windows 10: Starting Fast. Finishing StrongQuest
Industry expert and founder of Techvangelism, Nick Cavalancia, and KACE product expert Bruce Johnson discuss the current migration trends, considerations and benefits of migrating.
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.
Our own UEM solutions engineer Bruce Johnson is teaming up with Microsoft MVP Nathan O’Bryan to help you strengthen your unified endpoint management strategy.
Effective Patch and Software Update ManagementQuest
In this session, industry expert and Penton Tech contributing editor Orin Thomas, offers all the advice you need to create a comprehensive and proactive strategy for implementing patches and updates.
Predicting the Future of Endpoint Management in a Mobile WorldQuest
In this on-demand webcast, you’ll get a feel for looming changes in the endpoint management landscape over the course of the next six months to five years.
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
In this on-demand webcast, Quest AD experts will show you how to reduce incident response time investigations across your environment. Discover how to automate your AD business continuity plan (BCP) to minimize your RTO (recovery time objective) in the event of a security incident that causes partial or total damage across your AD infrastructure.
Find out more at: quest.com/stophank
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Quest
Most organizations have multiple administrators with privileged accounts. But when you consider Hank the Hacker only has to breach one of those accounts to obtain privileged access to your environment, you start to get an idea of how important it is to keep an eye on those accounts.
In this live webcast, AD experts will show you how to both automatically remediate unauthorized actions immediately to minimize potential damage, but also automate security policy enforcement across Active Directory (on-premises and Azure AD) to mitigate the potential for recurrence.
Find out more at: quest.com/stophank
Sounding the Alarm with Real-Time AD Detection and AlertingQuest
Just because your hybrid Active Directory (AD) environment is secure today doesn’t mean it will be tomorrow. You need to stay on top of unusual or suspicious activity if you want to ensure everything happening in your environment is always on the up and up.
In this live webcast, AD experts will identify our two-fold strategy that defines inappropriate changes and then creates strategic alerts for when they occur. We’ll then explore how this strategy helps to reduce the risk of exposure caused by insider attacks and data breaches.
Take a look at the entire series: https://www.quest.com/stophanknow
Identifying Hybrid AD Security Risks with Continuous Assessment Quest
There are more hybrid Active Directory (AD) security risks in your environment than you think. Proper AD security isn’t just about whether it’s configured correctly; it’s about proactively assessing who has access to what: permissions, privileged groups, sensitive business groups, GPOs and data.
In this on-demand webcast, Quest AD experts will show you how to conduct a thorough assessment of your environment so you know who has access to what. Assessing your security configuration makes it so you can easily identify access to:
• Active Directory
• Exchange Online
• File Servers
Take a look at the entire series: https://www.quest.com/stophanknow
Reducing the Chance of an Office 365 Security BreachQuest
Office 365 includes some security features, however those may not be enough. Join Orin Thomas and Quest's Todd Mera as they discuss what you can do to reduce the risk of an Office 365 security breach.
Office 365 Best Practices That You Are Not Thinking AboutQuest
Microsoft MVP Mike Crowley, Baseline Technologies, will join Quest cloud expert Ron Robbins to explore how to translate your existing on-premises security and compliance strategy to the cloud.
How to Restructure Active Directory with ZeroIMPACTQuest
We’ll explore best practices for reducing risk and avoiding disruption during AD migrations, ways to improve security, ensure compliance and simplify AD consolidations, and integration processes that can help carefully manage your project before, during and after the actual merger.
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
Security expert Randy Franklin Smith will explain the reasons why you might go through the extra trouble of a "red forest" — as well as the limitations of this structure.
Top Five Office 365 Migration Headaches and How to Avoid ThemQuest
Join experts J. Peter Bruzzese, Microsoft MVP, and Jeff Shahan, migration guru at Quest, as they pull together their real-world migration experience to outline five potential migration risks and how to avoid them.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
1. Quest to the Cloud
November 1, 2017
Identifying the barriers to accelerate O365 adoption
2. Confidential2 Confidential2
SPEAKER: Curtis Johnstone
Curtis Johnstone is a Senior Product Architect with Quest Software and a Microsoft MVP.
He has more than 15 years of Microsoft enterprise deployment and application development
with Microsoft Office 365, Skype for Business, and Exchange. He leverages his domain
expertise to design, develop, and deliver world-class management applications for the
Microsoft servers and services, including new SaaS management solutions delivered on
Microsoft Azure.
Curtis is also the founder and lead contributor of the popular Microsoft Skype for Business
blog www.InsideSkype.com.
Curtis.Johnstone@quest.com
HOST: Nathan O’Bryan
Nathan O’Bryan is a Microsoft MVP (Office Servers and Services).
Nathan spent the last 20+ years working in IT, starting as a Banyan Vines
administrator for the US Marine Corps. Since then, Nathan has worked for companies
like GE Capital, Kaiser Permanente. In 2013 Nathan attended what turned out to be
the final rotation of the Exchange Master course in Redmond Washington where he
became a Microsoft Certified Solutions Master: Messaging.
These days Nathan works as a consultant focusing on Exchange, Active Directory,
Lync, and Azure projects.
Speakers
3. Confidential3 Confidential3
SPEAKER: Shawny Reiner
Shawny Reiner is a Strategic Systems Consultant at Quest. Throughout her
20-year IT career, she has gained experience working with many
technologies and industry verticals.
Her passion, focus, and primary area of expertise is Microsoft infrastructure
platforms such as Active Directory. As a former customer herself, Shawny
enjoys sharing her experiences with Quest solutions and showing how they
add value and can positively impact customers’ environments.
shawny.reiner@quest.com
Speakers
SPEAKER: Matthew Vinton
Matthew Vinton spent thirteen years consulting in the Microsoft Platform
technology space before joining Quest in 2013.
While he specialized in Active Directory engineering and migration, he has
also worked extensively with Microsoft messaging, unified communications,
and end point management platforms.
matthew.vinton@quest.com
7. Confidential7
Risks
• You can’t fix what you don’t see
• Loss of productivity and possible security issues
• Loss of legitimate changes if you do a full restore or synch from on prem
1. Insider or external attack
Hank has been causing problems for the
last week, and it’s not clear what he has
changed or when.
Several legitimate changes have also
occurred in the environment.
8. Confidential8
Risks
• With Azure AD, once a group is deleted, you will not be able to do a simple
restore. You must use PowerShell (PoSH).
• Even with PoSH, you cannot restore the group’s membership – only its ID
• You have about 30 days before the Recycle Bin times out
• You will permanently lose hard deleted objects
2. Accidental or malicious deletions
Carl didn’t know that some Azure AD
(AAD) groups can’t be recovered from
the recycle bin and that group
memberships are never recoverable.
9. Confidential9
Risks
• Enabling communication for contractors could impose security risks for highly
regulated industries.
• Could impact compliance
3. Restricted data sharing
Ed Snow is an employee at an aerospace
company who frequently works with external
contractors.
He must go through a defined security protocol
prior to sharing electronic documents.
Ed is disgruntled.
11. Confidential11
Mitigating Sensitive Data Leaks via mobile devices
• Mobile phones can contain transcripts of
Skype for Business IM and conferencing
sessions.
• Increased mobile usage is increasing the
amount of sensitive data on mobile devices.
4. Data Loss Prevention
Risks
• Many organizations allow unmanaged mobile devices.
• If a mobile device (phone or tablet) is lost or stolen, sensitive communication data is at risk.
12. Confidential12
5. Controlling sensitive data with mobile workers
Securing sensitive data
Lynn is an O365 admin for an engineering
company. To protect patents and sensitive data,
she needs a way to ensure that her growing
mobile work force can use mobile devices while
preventing data loss.
Risks
• Some mobile devices used by employees can’t be encrypted
• If a mobile device (phone or tablet) is lost or stolen, sensitive communication data is at risk.
13. It’s not all gloom
and doom.
To move forward
quickly and safely,
prepare, prepare,
prepare!
14. Confidential14
• Product Page https://www.quest.com/on-demand/
• Free 30 day trials on the page (instant access)
• Whitepapers on Azure AD best practices (3-part series):
• Building Effective Azure AD Practices (part 1) – Continually Assess
• Building Effective Azure AD Practices (part 2) – Detect and Alert
• On Demand community (check out our 3 min vids!)
Where to learn more
What are we seeing in terms of cloud adoption and what are the associated expectations?
Curtis
What is driving them to move workloads into the cloud? Based on your conversations with organizations, what is the “gateway” software for them?
Matthew
What impact will this have for IT Pros?
Shawny, Matthew, Curtis
How many organizations modify their business continuity plans to accommodate their Azure AD environment before they implement it? What impact could this have?
Shawny
If companies have not cleaned up their on prem AD and have now synched to Azure AD or if they haven’t yet had a chance to get control of their admin users in either environment, what risks could it pose in a cloud environment?
Matthew
What are implications of failing to have a solid backup and recovery plan for Azure AD and Office 365?
Shawny
How can implementing policies upfront prevent potential security breaches?
Matthew
Is it possible that moving to the cloud could make security and compliance easier to control? What would you need to do to ensure you stay on top of this from the beginning? How does retention policy help?
Curtis
What role does Office policy management play in compliance enforcement?
Curtis
Do you think many companies have a plan when it comes to securing or controlling data that can accessed via mobile devices?
With GDPR looming in Europe, how are global organizations facing potential compliance risks when it comes to mobile workers?
Matthew
How can you accelerate your O365 adoption?
By preparing to manage the pitfalls, organizations can accelerate their Office 365 adoption and expand their workloads in the cloud.
Shawny – Recovery, Security
Curtis – policy management
Matthew – compliance, auditing
“What are the most important Skype for Business Online policies are should be thinking about when moving to Office 365?”