Understanding the boundaries of securing your SharePoint Data

The following is external content provided as a free resource for blog readers.





The problem with Data Breaches is that it only takes one to succeed, data security is a layered approach when done correctly, and in this talk we are going to focus on what you can do Out of Box (OOB) to lay the foundation for managing security for your SharePoint Data. When it comes to boundaries, one must understand how much may be done via culture, education, OOB, and understanding where Third Party solutions fit into that equation. A true layered approach is understanding where your OOB capabilities end and where ISV's and their solutions begin. Protecting your data is a mixture of implementing cultural behavioral changes & technology and we can begin by creating and adhering to policy and procedure guidelines, managing access to information, and proper reporting. Often times data breaches comes from the inside, in that while you are busy protecting everyone from coming in the front door, someone on your internal team is sneaking something out through the back door. Join us as we discuss this and a lot more around this important topic.



Speakers:

  • Fabian Williams - is a SharePoint Architect at Planet Technologies, Inc. in the Federal Information Worker Practice. His work with the SharePoint product line dates back to the 2003 release. Fabian holds a Bachelors of Science degree in Computer Information System “Magna-Cum-Laude” from Strayer University, Washington D.C. and his Masters in Computer Information Technology studies at the Johns Hopkins University Carey School for Business in Columbia, Maryland. He holds the following Microsoft Certifications MCSE, MCSD and MCDBA.

  • Steve Marsh - is Director of Product Marketing. Steve joined Metalogix in the spring of 2010 to help build on the momentum that the company has been enjoying in Europe with their Microsoft SharePoint Migration, Storage Optimisation and Management technologies. As well as speaking at various events, including the Microsoft SharePoint Conference in California and the European SharePoint Conference in Berlin, Steve also spends a lot of his time working directly with Metalogix customers and partners.



    Request Free!



Securing DNS to Thwart Advanced Targeted Attacks and Reduce Data Breaches

The following is external content provided as a free resource for blog readers.





Internet traffic is severely affected when critical DNS services are not reliable or are compromised by cyber attacks, just as highway traffic is disrupted or stopped when bridges are damaged. Even worse than disruption, insecure DNS services can be used by attackers to impersonate a business and route customer traffic to malicious sites that steal usernames, passwords, account information or valuable intellectual property.



DNS services can be secured with the right configuration and deployment of appropriate solutions, but in many IT organizations the responsibility is spread across multiple groups and often falls through the cracks. CEOs and CIOs should ensure first that DNS governance is well defined and then make sure those DNS services are delivered efficiently, reliably and securely.



Request Free!

10 Ways Everyone Should Approach Cybersecurity in 2015

The following is external content provided as a free resource for blog readers.





Many security breaches over the last year have taught us new lessons (or clarified ones we should have already learned). This paper reviews these key issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.



Request Free!