Saturday, 10 March 2018
Friday, 9 March 2018
Traditionally, Microsoft SQL Server, being part of Microsoft’s back office platform, has always run on Windows operating systems. However, Microsoft has made a commitment to enable customers to choose any platform. As part of this commitment, for SQL Server 2017,
The requirement was to Secure Remote Access to Server in a private cloud infrastructure, where the customer wanted to provide RDP of Microsoft Windows Server with different RDP port other than the default one which shipped with default Windows installation.
Monday, 5 March 2018
The recent years have witnessed a distinct and consistent escalation in cyberattacks’ scope, scale, and sophistication, impacting organizations across all verticals and locations. This escalation is manifested not only in increasing proliferation of threat-actor groups, but also in the diversity of the utilized attack Tools Techniques and Procedures (TTPs), ranging from zero-day exploits to weaponized antimalware and publicly available toolkits.
This threat landscape is driving a change in the common security paradigm, bringing security stakeholders to realize that a resourceful and determined attacker will at a certain point succeed in bypassing the traditional prevention and detection controls.
To proactively respond to these threats, there is a need for a security layer that operates following the successful bypass of these controls and is tasked with detecting the malicious activity consecutive to this bypass.
Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.
Most of the people are still running Windows Server 2008 in the network and wants to safely migrate to Windows Server 2012 R2 edition. Windows Server 2012 R2 adds some significant new features to both Active Directory Domain Services (AD DS).
Make no mistake: over the last few years, we’ve seen faster acceleration of government organizations moving to the cloud. So why now? This move is driven largely by the desire to bring the most up-to-date tools and capabilities to employees to meet demands for mobility and create a more modern workplace—and to ensure they are better equipped to face rising security challenges. And this desire is supported by recent legislation like the Modernizing Government.Technology Act, which creates IT modernization funds to help agencies replace aging infrastructure that poses security risks.