No results were found for your request.
No results were found for your request.
CionSystems has been selected as a 2009 Microsoft Startup of the Day. The company was chosen out of an international field of startups as delivering market-leading customer solutions built on Microsoft technology. Building affordable and secure Active Directory management applications for the Windows infrastructure has been the focus from the beginning. “We are honored...
IT personnel cannot effectively manage their infrastructure without admin-level access. But with gaining this access comes great responsibility. Most companies do not effectively allocate their resources or implement enough technology tools to prevent information security risks. Often enough the response to countless regulations is to concentrate on building controls against external and internal business...
Access control is often discussed as part of identity and access management (IAM). This is a market that has grown during the past few years thanks to more and more organizations wanting to satisfy compliance requirements. Better access control is needed- not just for compliance, but also to address vulnerabilities and safeguard against malicious...
Active Directory can be used to manage Wireless configurations and can really help remote users leverage wireless. I recently read a great article about this on TechRepublic and although Derek is using the GPMC, other third party applications like the Active Directory Manager can be used for Group Policy creation and management.
It is difficult for an IT administrator to keep a constant vigil on the available disk space for their file and print servers. This becomes critical if the servers host Exchange and SQL because running out of disk space can cause Exchange and other database-dependent application to fail. Email is a business-critical application, and anything affecting...
IT managers have a tough job ahead of them. Having to keep the company’s workstations and servers secure and at the same time providing a flexible work (technology) environment that will handle exceptions as they come up. It’s a tall order. The first instinct is to make the workstation so secure that it’s unusable....