When IT worked within brick and mortal walls, monitoring the network was easy. But with the shift to using cloud-based data centers, virtualization, and IaaS, knowing what you have – let alone, how well it’s working – is a challenge.
So, how can you ensure an ever-changing environment runs optimized when you can’t even see it?
In this recorded webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Benjamin Day from Paessler, as they discuss:
Your data center is defined by today’s modern business need of "always on with zero downtime". And yet, you’re still relying on age old backup methods and technologies whose performance, at best, is still measured in terms of hours or days.
So, what’s the difference between traditional backups and true availability – and how do you bridge that gap?
In this recorded webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Doug Hazelman, Veeam VP o
When it comes to SharePoint, even implementing security is about collaboration. While SharePoint can be self-sufficient with its’ internal security, it makes more sense to take advantage of already established Active Directory groups. While this can make the lives of the SharePoint folks simpler by utilizing AD groups to grant permissions, it also complicates things since they have no control over who gets added as a member. And the AD folks aren’t about to create even more
If you’re like most IT organizations, AD groups are one of those tasks that are “set it and forget it.” But after years of neglect, you’re now in charge of massive numbers of groups with no documentation, rampant security issues, and the charge to get it organized to meet security and compliance objectives.
So, what steps should you take to get groups under control?
In this recorded webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Jonat
Your endpoints – both your workstations and servers – represent some of the most exposed attack targets on your network. By accessing email and the web, these machines can entertain a direct line to malicious code. And users requiring varying levels of elevated privileges place IT in the precarious position of balancing the potential risk to the network with the needed productivity of the user. So, how do you protect your endpoints while still keeping users productive? In t
Today's printing environment is a convoluted mix of mobile users, BYOD, printers, drivers, and settings - all driving up the cost of management and ownership. As the technology has evolved, unfortunately, print servers used to manage printing environments has not. Eric Graham, CTO of VCPI faced these challenges across the 2.400 long-term and post-acute (LTPAC) health care centers he supports. Watch Graham, technology expert and founder of Techvangelism, Nick Calavancia and
Elevated privileges are a necessary part of IT. After all, you simply cannot do your job without them. But we are also working at a time in our industry where insider threats, spear phishing attacks, data theft, and compliance breaches are equally a reality for the organization, making it critical for IT to keep close tabs on the very keys to your organization: privileged passwords. With both internal and external threats to the organization at an all time high, should IT be
You've performed countless audits for your critical systems, like AD, Exchange, file systems, and others, and think you have it down by now. But how do you know you're capturing all changes that an auditor needs? In this recorded webinar, hear from industry expert and founder of Techvangelism, Nick Cavalancia, as he discusses what the most common items asked for by auditors are, and then help you prepare for the dreaded next-level questions. You've conquered Auditing 1.0, now
Everyone’s got them – Insiders. Some have only been here a few days, and others more years than even you. And, technically, you’re the ones enabling them to access critical data, sensitive intellectual property, customer lists, and more… all through the simplest of AD management tasks – group memberships. So are insiders (that is, your users) a problem and is IT adding to that problem when it comes to insider threats? Not every Insider is a problem. And not every IT departmen
Virtualization was something that was supposed to simplify our lives. And, in some ways, it has, but in others it’s complicated things. In it’s early days, virtualization was as easy as a single server and a few VMs, but today’s virtualization has multiple hypervisors, clusters, server farms, virtualized or shared storage, and the list goes on. And now that you sort of have what you have in terms of a virtual infrastructure, you’re tasked with protecting every bit of data –