Main Navigation Section

Diane's Blog Test Page

Monitor and secure AD with comprehensive Active Directory auditing tools. Active Directory continues to be the cornerstone for securing access to business-critical applications. Yet change reporting and vulnerability monitoring for AD is cumbersome, time-consuming, and often impossible using system-provided IT auditing tools. Adopting Azure AD only increases your reliance on Active Directory, while doubling the attack surface and introducing additional opportunities for ransomware and other exploits. This often results in data breaches and insider threats that can go undetected without protections in place. Fortunately, Change Auditor provides real-time threat monitoring and security tracking of all key user activity and administrator changes.

Related Blogs - 1 Blog

Related Blogs - 2 Blogs

Description for this section will go here.

Related Blogs - 3 Blogs

Related Blogs - 4 Blogs

Related Blogs - 6 Blogs

Blog 1 

An important part of Microsoft 365 (formerly Office 365) migration is choosing the right migration method. This article breaks down the different types of Microsoft 365 migrations and offers key strategies and technical approaches for the primary Mic

Karin Skapski

The key components of endpoint security management and how it reduces risk 

In this new era of remote work and boundless perimeters, the approach to managing endpoint security has evolved significantly. In this article, we’ll examine some of the key components necessary for effective endpoint security management in today’s l

Dave Hunter

Understanding detection in ITDR through tactics, techniques and procedures 

In this post, we will unpack these terms and their definitions, and explore real-world examples of how to approach identity threat detection and response (ITDR).

Matthew Vinton

Developing a data modernization strategy 

Data modernization is the effort to enhance decision making and drive innovation and growth by improving your company’s data infrastructure, systems and processes. These initiatives typically include projects like migrating data from outdated systems

Danny Sandwell

The importance of integrating storage tiering into your backup strategy 

Your data is important. It’s the lifeblood of business and has never had so much impact when it’s not available. However, not all data is equal. When we look at the lifecycle for data it needs examining about what you are going to protect, how you ar

Adrian Moir

What is storage tiering? How does it work?  

Storage tiering is the practice of taking specific backup data that is unlikely to change or be accessed, and moves it to low-cost storage, usually in the cloud.

Adrian Moir