CionSystems – Reporter

Channeling comprehensive information to auditors, administrators and senior management in meaningful reports helps companies comply with standards of their own as well as federal requirements. CionSystems Active Directory Reporter tool shines light on the inner activities of your Active Directory infrastructure.

CionSystems – Recovery

Anything from human error, malicious events or unforeseen environmental catastrophes can wipe out your critical system infrastructure. Having your critical systems crash is unacceptable when your customers deserve the best from you. Having systems go down for 24 hours or even days is unnecessary when you can back your systems up with CionSystems Active Directory Recovery.

CionSystems – Change Notifier

IT professionals who work with Active Directory know this can be a very beastly experience. However what’s troubling is change management for manage and unmanaged changes. It is imperative for IT professionals to know the changes that are happening to active directory, for example administrator group membership, accounts creation and deletion and so on not just from Audit/Compliance point of view but from Security point of view. Active Directory is the central repository that controls the access.

Road Map for an Application/Software Security Architect (Part 6)

So, the application designer has disclosed that the solution for the web services being designed will involve the (1) need to authenticate; (2) need to determine levels of authorization; and (3) [by the way] need to have some personalized data be carried forward to the application. If you, as a the security architect involved in […]

Road Map for an Application/Software Security Architect (Part 5)

Without a Digital Identity, how would you expect to do any authentication? And with an incomplete Digital Identity, how would you expect to get the authorization done correctly? Without the proper data model and the expectation that it would have the correct data (besides being in the right place at the right time), securing a […]

Road Map for an Application/Software Security Architect (Part 4)

Planning your application’s use of the digital identity is not an after-thought of system architecture. At the least, it might offer the occasional lack of reliable and conflicting information. At the worst, it provides little, if no protection, at all. And like the proverbial little dutch boy, you will be putting fingers in the holes […]