Active Directory Manager Pro version 4.0.0.2

With the release of CionSystems AD Manager Pro 4.0.0.2 you know have Web based access to PowerShell cmdlets without the need to install Powershell!  This lets users and  workflows invoke cmdlets to manage: ·         Active Directory ·         Exchange ·         Office 365 ·         File Shares ·         Managed Service Accounts ·         Local computer accounts CionSystems AD Manager Pro makes it easy to delegate […]

Active Directory Manager Pro version 4.0.0.0

With the release of CionSystems AD Manager Pro 4.0.0.0 you know have enhancements to many of the popular features such as Workflow Support Robo Request Secure provisioning and deprovisioning Role Based Access, Delegation Exchange mailbox management Bulk object management Customizable templates increase functionality Change Approval process Office 365 Management Exchange (2007/2010/2013) Management Through Powershell AD […]

Active Directory Self-Service version 3.0.0.1

CionSystems Active Directory Self-service, 3.0.0.1,  extends  Self Service and delegated management to group membership.  The solution is fully integrates email based notification and requests and  supports both Outlook and non-Outlook clients.  With this solution, you can manage all your groups –both security groups and Distribution Lists – including adding and removing members, and applying workflow […]

Two factor authentication and self-service for any Web application

CionSystems’  Self-Service provides a two factor authentication systems that can be easily integrated with any web or non-web application. Instead of application managing the authentication, offload that functionality to CionSystems self-service authenticator and self-service module. In addition the application provides end users self passwords reset and unlocking of accounts. It also allows them to securely […]

Password Synchronization from on-premise domain to Office 365

Now users’  Domain Account Passwords and  Office 365 passwords can be synchronized regardless of where or how the password change was initiated .   Change requests are intercepted, validated against  Office365 password complexity requirements and  then applied.  This is done securely, over an encrypted connection, protected from man in the middle attacks, spoofing, network capture,  or […]

Sony’s security challenges are a warning to all industries

Being proactive and forward thinking with your technical infrastructure can give administrator and technical leadership the agility to get in front of malicious technical events before they cannibalize the total integrity of your product offerings and services. All it takes is a moment of oversight to lose total reliability. If you haven’t already sat down to update your technical infrastructure then now is the time.