Skip to content

What Can Smartphones Teach Us about the Future of Data Centers?

Man Holding Smartphone

A couple of weeks ago, I had an amazing and interesting day that got me thinking about what might be the future of Enterprise DC infrastructure.

The first amazing thing was watching our daughter’s reactions when my wife and I bought her first phone; she was so excited. The second interesting thing happened that evening as I watched a primetime NBA game. During a commercial break, for the first time, I saw a Dell Technologies ad for integrated, one-stop-shop Enterprise DC infrastructure.

Continue Reading →

Securing Your Biggest IT Risk: Microsoft Active Directory [SlideShare Presentation]

Chain Links

We’ve said it before, and we’ll say it again: Active Directory (AD) is a lot more important than you might think. Yes, it’s a convenient utility, but it also serves as the veritable keys to your kingdom. Privileged credentials, certificate validation and rights management? All handled by AD.

After all, 63 percent of confirmed data breaches involved weak, default or stolen passwords. And, since AD is the core identity system for more than 90 percent of organizations, chances are that most of those data breaches also involved compromised AD.

At this point you might be asking, “If AD is so crucial, then why is it so frequently underprotected, and how can I protect mine?”

Well, you’re about to find out.

Continue Reading →

Your Enterprise Is Going Hybrid … How Do You Secure Information Technology?

 

The Word Hybrid Written in Clouds

Over the last few months, I have been in many discussions with Enterprise CIOs and CISOs after they have realized the security and visibility challenges they now face after committing to fully and formally adopting a hybrid architecture for their Enterprise ITs.

These discussions have been fascinating and stimulating and have had an uncanny amount of similarity regardless of enterprise size, market segment, industry vertical or even enterprise age. (However, it’s worth noting that all of these customer conversations have been with organizations that are old enough to have a significant on-premise infrastructure IE that’s at least a few years old).

The story arc for all of them is similar, with a similar set of systemic challenges now facing these organizations. Let’s take a look at how they got here and the options they have going forward.

Continue Reading →

Why 90% of IT Environments Are Likely Hackable

 

Hacker

Over the past year, we’ve been conducting extensive Microsoft Active Directory assessments across varying organizations. Our findings revealed the startling fact that nearly 100 percent of IT environments are susceptible to malicious attacks, thanks to just one critical application: Active Directory. Let’s discuss some of the reasons why this is.

Continue Reading →