Sujata Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form

Posted by on in Sujata Computers Pvt Ltd

Autodesk


Hits: 1261
0

Posted by on in Sujata Computers Pvt Ltd

Samsung

Hits: 1187
0

header

Dear Sir/Madam,

Starting July 14, 2015, Microsoft will end all support and updates for Windows Server 2003.

As your trusted advisor and partner, we’re hosting an exclusive series of webinars to help you with a smooth transition from Windows Server 2003. The last webinar focused on the process of migration.

The upcoming webinar, to be held on February 19, 2015 will detail out the practical considerations and best practices of migration from Windows Server 2003. We will also take you through the licensing options available.

Register for the webinar now and stay ahead in the game.

Regards,
Microsoft Team

Hits: 1212
0

Source of information: Office blogs

Written by: Microsoft office 365 team

We’ve all been there, you search for an email or calendar invite in Outlook only to find that it isn’t there anymore. Until now deleted items were moved into the Deleted Items folder, then they would disappear after being in that folder for 30 days. With this update, the length of time items remain in the Deleted Items folder is extended to indefinitely or according to the duration set by your administrator. So that email or calendar invite you were looking for is still there if you search for it later—even if you accidentally deleted it.

If you are an Office 365 administrator, this means we’ll be updating the Default MRM Policy for everyone using Exchange Online over the next month. As an administrator, you also have control over this behavior. If you want to keep the 30-day policy or set a custom retention period, that can be done as well and you don’t even need to wait for the change. Also, if you have already created a custom MRM policy, (as long as it has a name other than “Default MRM Policy”), you don’t need to do anything and the change will not impact you.

Create a custom retention policy

You can either edit the name of the Default MRM Policy or create a new policy to opt out of this change. To change the policy name in Office 365 navigate to Office 365 Admin >Exchange admin center > compliance management > retention policies. Next, select Default MRM Policy, click the edit icon and then change the name of the policy.

Extended-email-retention-1

Exchange admin center for compliance management and retention policies.

Extended-email-retention-2-edit

Editing experience for retention policies.

Now your policy will not be overwritten and will maintain the settings you’ve specified. Frequently asked questions

Q. Will this be only for new users or will this policy change for all my users who are already in Office 365?

A. This change will affect all existing and new users in your Office 365 tenant who have been assigned the Default MRM Policy.

Q. What if I customized the Default MRM Policy with other settings and properties, but did not rename it?

A. Modifying the properties in the Default MRM Policy alone will not exclude it from being overwritten by this change. If you have customized your Default MRM Policy and kept the original name, the change will still apply.

Q. Does this policy apply to the Recoverable Items folder?

A. No the change does not apply to the Recoverable Items folder. It is only for the visible Deleted Items folder.

Q. If I already have a custom retention policy, will it also be changed to this new default?

A. No, custom policies that you have created will not be modified. For example, if the admin has added extra tags, modified the retention period, modified retention enabled of an existing tag etc. the new behavior will not be enforced.

Q. Does this change affect “Move to Archive” actions on the Deleted Items folder?

A. No, this change will not affect any explicit tags set by the users on items in the Deleted Items folder.

Q. If there is a “Move to Archive” action on the Deleted Items folder will that be affected?

A. No, the change will not affect any “Move to Archive” actions on the Deleted Items folder.

Q. Will this change apply both to the primary and personal archive mailbox Deleted Items folders?

A. Yes, the change will apply for the Deleted Items folder in both the primary and archive mailbox.

Q. Will this change affect a Litigation Hold or In-Place Hold?

A. No, this will not an affect Ligation Hold or In-Place Hold.

Q. How is Microsoft implementing this change?

A. We are instructing the system to ignore the 30 day delete tag on the Deleted Items folder if the retention policy’s name is “Default MRM Policy.”This is why changing the policy name will ensure that the tag continues to work. We are not removing or disabling the tag.

Hits: 1247
0

UNIFIED THREAT MANAGEMENT (UTM)

In today’s increasingly mobile world, networks change constantly posing new challenges to IT team and to the administration on how to control security and protect the data. New services, access methods, and even devices continue to show up in networks at a frenetic pace.
For years, you must have been told that you need antivirus or some piece of software to protect your computer. These antivirus or software are usually reactive and alert you once they discover something unusual on a particular computer and not in the network. Of course, they are helpful but they do not provide full-proof security to your data and to your network.
 
Users are accessing an increasing number of applications with a wide range of device types, often times to get their job done, yet with little regard to the business or security risks. Meanwhile, datacenter expansion, network segmentation, virtualization and mobility initiatives are forcing you to re-think how to enable access to applications and data, yet protect your network from a new, more sophisticated class of advanced threats that are adept at evading traditional security mechanisms.
 
Below are some challenges that are now concerns for Mid-size and Enterprise Businesses -
 
Challenge #1 : Employees bringing their personal mobile and tablet at work creates data security a concern for IT team

Who could have foreseen the impact of WhatsApp, Twitter and Facebook,or iPads and Android smartphones and tablets, only a few years ago? Today, employees expect to use personal smartphones and mobile devices at work also known as Bring Your Own Device (BYOD), making data security a concern for IT teams.
 
Challenge #2 : New applications evade threat detection
Traditional or “first-generation” firewalls rely on scanning of port numbers or protocol that are used by applications to detect the  threat and to prevent any misbehavior or intrusion in the network.
Traditional firewalls cannot detect new applications that are accessed through web browser and do not use specific port number or prototype.
 
Challenge #3 : Multiple Devices or Tools Addressing Incoming Data Security Threats
With the new challenges and threats, there is a need to have multi-level security and to do so, we do not recommend customers to buy different brands of traditional firewall, Data Loss/Leak Prevention (DLP), Intrusion Prevention System (IPS), filtering of websites and data traffic, malware screening at the gateway level and patch management in the network. Different tools create problem of managing them effectively and there can be a problem of compatibility.

From a performance point of view also it is not recommended as each tool/device performs its own inspection of network data, which means that data is inspected multiple times by multiple devices and that create a time latency in data transfer.

In below image, you can see the flow of the data and the possible ways in which threat can enter into the network.

UTM


BOTTOM-LINE :

As a network’s complexity increases, so does the expense required to manage that network.
Every administrator should carefully consider the TCO of add-on security appliances versus an integrated solution like UTM or Next-Gen Firewall before making significant infrastructure solution commitments.
UTM should be flexible in terms of output, should be future-ready and should be powerful enough to support your requirement.

The application, content, and user—the elements that run your business—then become integral components of your enterprise security policy. The result is the ability to align security with key business initiatives.

  • Safely enable applications, users and content by classifying all traffic, determining the business use case and assigning policies to allow and protect the relevant applications.
  • Prevent threats by eliminating unwanted applications to reduce the threat footprint and applying targeted security polices to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).
  • Embrace mobile computing by ensuring devices are properly configured and that they are protected from threats.
  • Protect your datacenters through validation of applications, isolation of data, control over rogue applications and high speed threat prevention.
  • Secure cloud-computing environments with increased visibility and control; deploy and maintain security policies at the same pace as your virtual machines.

UTM-Solution-Sujata Computers Pvt Ltd

As we write this, the best UTM solutions for networks include the following core security functions / policies in their arsenals:

  • Network firewalls perform stateful packet inspection.
  • IPS detects and blocks intrusions and certain attacks.
  • Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  • Support for virtualized environments, both virtual domains and virtual appliance.

They also include additional security technologies that organizations can choose to deploy, including

  • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  • Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks.
  • Endpoint control that enforces corporate security policies with remote users and devices.
  • Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.

SOLUTION TO CHALLENGES ABOVE :
UTM solution is integration of multiple security features like firewall, application control, intrusion prevention, VPN, reporting and other elements into a single product. There are multiple brands for which Sujata Computers Pvt Ltd has expertise in.  We can recommend you an appropriate brand and model from Fortinet, SonicWall, Check Point, Cyberoam, Juniper, Palo Alto, Sophos and Cisco depending on your use, industry, existing and future infrastructure, budget and skill-set available with your IT team.
In short, we recommend UTM that includes following features:

Firewall
Application Control
IPsec and SSL VPN
IPS
Web content filtering
Anti-spam
Data loss/leakage prevention
Anti-virus and anti-spyware protection
IPv6 native support
Traffic shaping and bandwidth control
Detailed reporting
and if you have no constrain on budget, you should opt for UTM that has independent processors for one-single activity (feature) i.e the more silicon is in UTM the better performance it will deliver.

We also take up responsibility of maintaining the UTM for its customers and help them implement it. We can sign an annual or long-term service and support contract for UTM and help our customers safeguard their infrastructure.

CONTACT SUJATA COMPUTERS PVT LTD (INDIA) FOR UTM

Dinesh Golecha | +91-8888165300 | [email protected]
Paresh Lodha | +91-7276000222 | [email protected]

Hits: 1327
0

Contact Us

Email: [email protected]

India: +91-20-40100300

US: +1-7323195103