data security and governance

3 Steps to Gaining Control and Governance over Permissions

For most organizations, the evolution of their environment is focused on addition. Such as adding new servers, applications, connections, cloud resources, and directory services. The same scenario applies to your organization. With each part of this growth comes an equally growing number of permission assignments. These permissions make up your current state of security. But we all know, once a permission assignment is made, it is usually never thought of again.  But now, among the…

remote teams

How to work effectively with a remote team, the right way

The sudden change in global affairs has likely created new challenges for you and your team, making it hard to keep up with what matters most to your business — your customers and employees.   With many people forced into shelter-in-place by the current situation, the question of how to survive this pandemic has suddenly morphed to how to work effectively with a remote…

Managing

Managing LDAP groups in the Enterprise

Managing LDAP groups in the Enterprise Today’s enterprise-sized businesses have moved beyond the single on-premises directory. The need to leverage platforms and applications that reside outside the four proverbal walls of the organization have resulted in an uptick in the use of 3rd party LDAP directories within these environment, whether hosted on-prem, in a corporate…

project database

Active Directory Group types: universal groups, global groups, domain local groups

Active Directory Group types: universal groups, global groups, domain local groups I had been demonstrating how to manage the creation and automation of Active Directory security groups and distribution lists for months before I realized that I had no idea what the differences were between the three types of Active Directory groups: universal groups (UG),…