Identity & Access Management

Privileged Access Workstations: Securing Administrative Tasks

Privileged Access Workstations

Many companies are trying to better secure their administrative tools and sensitive data. Leveraging Privileged Access Workstations (PAW) is a good way to reduce the threat vector on these sensitive tasks and systems. PAW are separate client computing environments that can take advantage of added security measures like multifactor authentication (see our post on Six Design …

Privileged Access Workstations: Securing Administrative Tasks Read More »

EUC Delivery: Master Image Optimization

Optimizing application delivery to your end users.

With the likes of Google and Twitter announcing long-term plans for a distributed workforce, the models used to serve our end users increasingly take on a higher priority. As this transition further develops, we move from planning, or early implementation, to optimization within our technology delivery platforms. Earlier, we explored your options for delivering services …

EUC Delivery: Master Image Optimization Read More »

Exploring a NAC Maturity Model

Network Access Control

As our current technical service models stabilize during this work from home transition, we’ll take a minute to visit strategies for improving our user experience for the future return of employees to the office. Today, we explore a Network Access Control (NAC) maturity model and the maturation of the deployment within our ecosystems. NAC Maturity …

Exploring a NAC Maturity Model Read More »

Horizon Desktop: Physical Desktop Management

quick fix to support your work from home transition

The increased need to allow employees to work from home may be putting stress on your Horizon Desktop infrastructure. One quick fix for quickly scaling up the resources available to employees is managing your physical desktops with VMware Horizon. In the past physical desktop management in Horizon has been a time-consuming task. Installing the agent, adding the desktop …

Horizon Desktop: Physical Desktop Management Read More »

Exploring Your Technical Options after a “Work From Home” Mandate

Creating a strategy your work from home user base.

It’s finally happened…your company’s leadership came to you and asked what it will take to enable your entire workforce to work from home for the foreseeable future due to the Novel Coronavirus (COVID-19).  How are you going to provide a computing environment for all these remote workers, and fast?  Let’s talk through the benefits associated …

Exploring Your Technical Options after a “Work From Home” Mandate Read More »

Cloud Readiness: Today’s Technical Elements to Prepare You for Tomorrow

Focus on your direction to be intentional about the journey.

So that’s it…you’re going to the cloud. This may not be your decision. It may be directed by a suit in an office somewhere. Other cases see operationally minded CIO’s acting quickly to ensure their technical teams are best aligned for the road ahead. And yet, others have done their homework and have determined a …

Cloud Readiness: Today’s Technical Elements to Prepare You for Tomorrow Read More »

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Considerations When Deploying Network Access Control

Who has the keys to access your network?

Network Access Control Overview Today we look at deploying Network Access Control (NAC) and five considerations to explore before implementation. Network Access Control is a solution that applies and enforces network access policies. In its most basic implementation, NAC is the decision maker of what devices are allowed on the network. NAC is implemented in …

Considerations When Deploying Network Access Control Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

Six Things to Consider when Deploying MFA

MFA deployment

Like many things in tech, the consumer experience drives corporate adoption. Well, in the case of Multi Factor Authentication, we, as individual consumers, have seen the place text message verifications, phone prompts, and IP-based tracking provides a layer of validation in our personal banking, email accounts, and mobile entertainment applications.   This experience has prepared users …

Six Things to Consider when Deploying MFA Read More »