compliance

Free webinar series: Advance your security and management skills with Derek Melber

Over the next few months, you have the opportunity to attend many free and live webinars presented by MVP Derek Melber. The topics will all be covering key security and management areas that all administrators struggle with today. The webinars …

Active Directory 1 min read

Tired of troubleshooting Active Directory?

Every Active Directory administrator around the world has the same issue. There is always someone else who can modify Active Directory! When incorrect changes occur, some issue usually arises from the change. A service fails, a user can not access …

Active Directory 1 min read

Good-bye 2015: Final week of year tasks for Active Directory

As administrators, we are the employees that rarely get to take time off work, as someone needs to ensure that the network is up and running. Sure, there is no one in the office, as everyone is taking vacation, but

Active Directory 2 min read

Monitor Files and Folders Like Never Before

Over and over, I get the same question from many admins and security professionals regarding the monitoring of files and folders. Although it can be complicated to address, I completely understand the issues, which are related to compliance and overall

Active Directory 2 min read

Auditing vs. Monitoring of Active Directory

I just finished a class where I had both auditors and administrators in attendance. It was one of the best groups I have had for that reason. From the class I learned that it is not always “known” what

Active Directory 2 min read

IT Security and Auditing Framework – A Glass Half Full or Half Empty?

Log Management, Compliance Reporting and SIEM

Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with an outsider are not options that ensure protection from information thefts. Not a day goes …

EventLogAnalyzer 4 min read

PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2]

[In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In this post, we’ll discuss the requirements in depth.]

When a customer presents a payment card to a merchant at the point of sale, a chain …

Password Manager Pro 4 min read

Can your organization be Hack Immune?

This past few months witnessed a record breaking global level of malware threats and APTs (Advanced Persistent Threat) that put the mightiest of Enterprises’ security at jeopardy! Since December 2009, post the Google Aurora attack, the way Enterprises see APTs …

EventLogAnalyzer , General , ManageEngine 3 min read