Securing AD for Hybrid Cloud Environments

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Securing AD for Hybrid Cloud Environments-6 Next

Use Forensics

Step 5: Use forensics to identify paths to breaches.

IT teams can reveal the most likely paths to any potential data breach by using 360-degree forensics and full-text search to connect events, access activities and security configuration across multiple data sets. These searches can expose tracks to possible breaches, including any activity in AD, GPOs, files and computers by a given user during a given period; any activity containing a given word, such as "finance" or "salary"; security configuration and changes for a given user; and membership information for any given group, including recent changes to membership.

Adoption of cloud services has undeniably soared, with Microsoft calling Office 365 its fastest growing commercial product ever, and more than 70 percent of Fortune 500 companies now using at least two different Microsoft cloud services. However, while organizations are actively deploying more cloud applications, they are also keeping on-premises solutions, creating a hybrid environment of both on-premises and cloud-based applications.

To manage employee authentication, identity management and access control policies across hybrid environments, companies often leverage the Azure Active Directory (AD) Connect management tool, which performs a one-way sync from on-premises AD to the online Azure AD. The problem is that on-premises AD does not include the same types of security controls that the cloud-based version does, leaving a big hole in an organization's security program that exposes the business to risk.

In this slideshow, Alvaro Vitta, principal solutions consultant specializing in security at Dell Systems and Information Management, recommends six steps for organizations to strengthen their hybrid directory environment to ensure successful hybrid cloud environment performance.


Related Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

cloud50-190x128.jpg How to Use the Cloud to Become a High-Velocity Business

Cloud SaaS adoption allows organizations to gain the flexibility and scalability necessary for creating a high-velocity business. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.