A Domain by Any Other Name
Know the signs and possible ramifications of domain name distortion.
March 21, 2023
Finding Delegated Permissions in Active Directory
How do you know if your AD delegation is set up correctly? Use Entitlement and Security for AD to simplify collection and reporting of all permissions, including delegations.
February 14, 2023
Applying ITIL4 Discipline to DDI
IP addresses and associated DHCP and DNS functions are foundational to IT services and applications running over an IP network; these functions must be prudently managed, just as other critical network infrastructure elements are managed via the centralization of control, monitoring, and provisioning of distributed network elements.
January 27, 2023
The Innumerable DDI Business Benefits
DNS-DHCP-IPAM (DDI) services are foundational to your network, which is foundational to your business in offering time and money saving features in the form of automation, improved security, high availability, and centrally managing your increasingly diverse network.
January 04, 2023
Are You Dreading Audit Reporting Time?
Do you spend a lot of time creating, running, and distributing audit reports? See how you can simplify the whole process by empowering users with Cygna.
December 20, 2022
Is DHCPSEC a Thing?
Dynamic Host Configuration Protocol (DHCP) and the Domain Name System (DNS) are both foundational IP network services, enabling devices to connect to networks (via automated DHCP address and parameter assignment) and to navigate networks (via DNS name-to-IP resolution).
December 06, 2022
How do you know who has access to what in Active Directory?
Active Directory (AD) is the primary method to provide authentication and authorization at 90% of the Global Fortune 1000 companies and the vast majority of organizations of all sizes. AD security issues can result in costly service disruptions and potentially data breaches or even non-compliance.
December 01, 2022
Do I need DDI for the Cloud?
As an extension or as the full extent of your enterprise infrastructure, ubiquitous accessibility to compute, database, and application resources in the cloud is imperative. Such accessibility implies network access, albeit with appropriate access controls, for your users to access the cloud services and applications they require.
November 23, 2022
Stop Unwanted Changes
Active Directory (AD) is the primary identity access management solution for most organizations. It is often used for federated access, single sign-on, and or synced with cloud systems so its reach goes well beyond local on-prem systems. This makes it a highly valuable target for bad actors. AD issues can result in costly service disruptions and business-crippling downtime. Data breaches and regulatory non-compliance can cause organizations to incur significant expenses.
October 05, 2022
SD-DDI for SD-WAN
Software defined WANs (SD-WANs) offer cloud-optimized network performance and agility. Your core network services of DHCP, DNS, and IPAM (DDI) must keep pace with a software-defined DDI (SD-DDI) solution.
October 03, 2022
Revive the Vitality of your VitalQIP deployment
Our multi-vendor DDI managed services enable you to extend the lifecycle of your embedded DDI systems without disruptive swapouts.
September 02, 2022
MS Sentinel and Cygna Auditor
This post reviews Microsoft Sentinel and the Cygna Auditor platform to highlight some of the main differences and complimentary aspects between the two solutions.
August 09, 2022
DNS: It's not just for humans anymore
Using DNS for machine-to-machine communications improves scalability and operational flexibility
August 09, 2022
While keeping your network's foundational DDI services up and running won't garner you many public accolades, you are indeed an unsung hero. DDI is the foundation of your network and if any part of it fails, the entire network will suffer.
July 13, 2022
Hybrid Exchange Auditing
Cygna Auditor provides a single correlated view of changes in Exchange Online and Exchange On-Premises.
June 23, 2022
Open Your Eyes to Better Network Security
Visibility is step one to identifying and monitoring network and DDI assets and transactions.
June 21, 2022
DDI as code
IP Address Management (IPAM) and its corollary functions DHCP and DNS, collectively DHCP-DNS-IPAM (DDI), is often considered a necessary evil by most IT and Operations Engineers.
April 25, 2022
Java Vulnerabilities and Exploits
The Cygna Auditor and PBMS code bases are not susceptible to java vulnerabilities and exploits.
March 31, 2022
The Non-Zero Components of a Zero Trust Network
In the face of a rising tide of network infiltration attempts via increasingly diversified attack vectors, enterprises must constantly remain vigilant and proactive in managing system monitoring and attack detection solutions.
March 28, 2022
Automate your DDI to Accelerate IT services delivery
Automation is among the key motivators for implementing an IP address management (IPAM) system.
February 17, 2022
Cygna Extends Multi and Hybrid Cloud Auditing with AWS
Cygna Auditor for AWS provides a cost effective and streamlined way to keep and view your AWS audit events.
February 17, 2022
Recovery for Azure AD
Cygna Recovery for Azure AD allows you to quickly and easily backup your Azure Active Directory data to help eliminate costly downtime.
January 25, 2022
The Cygna Auditor and PBMS code bases are not susceptible to the Log4j vulnerability that is actively being exploited.
December 14, 2021
We Put You in Control of Your Data – Database Segmentation
Cygna solutions are designed to put you in control of your data. This post discusses the new database segmentation functionality allowing Cygna Auditor data to be stored on more than one database server for unmatched scalability.
October 26, 2021
We put you in control of your data – Purging
Cygna solutions are designed to put you in control of your data. There are other new related features coming soon that will be covered in additional blog articles such as database segmentation and archiving.
August 20, 2021
Auditing Policies – Cygna Auditor for Active Directory
Cygna Auditor for Active Directory auditing policies have two main purposes, to protect objects from being changed or to exclude specified activities from being captured.
July 23, 2021
Cygna Identity Feature
Organizations are moving some of their workloads to the cloud and embracing SaaS solutions like never before. However, most organizations will still have key workloads on-prem for some time due to the cost, effort or regulatory / residency issues.
March 21, 2021
Active Directory is dead, long live Active Directory
If you were to look at topics being covered at Microsoft’s conferences, announcements, or social media one could easily assume that Active Directory (AD) is dead. It is correct that many organizations are embracing SaaS solutions and are going through digital transformations.
March 17, 2021
Cygna Auditor SIEM Event Forwarding
Cygna Auditor can now forward events to SIEM systems in a standard syslog format or in a structured view to Splunk.
February 08, 2021
Cygna Labs Adds SIEM Event Forwarding and Identity Grouping Features to Cygna Auditor Version 2.0
Cygna Labs releases a new version of Cygna Auditor (v 2.0.380) that implements event forwarding to SIEM systems as well as an account mapping feature that allows for the grouping of an individual’s user accounts from multiple on-prem and cloud systems to a searchable identity.
January 25, 2021
Delegation in Cygna Auditor
The Cygna Labs platform allows you to view and combine audit information from across your hybrid multi-cloud systems in a single web console.
September 20, 2020
Configure PBMS as a Data Source in Cygna Auditor
Since Cygna Labs took over the BeyondTrust Auditor Suite (PowerBroker Management Suite) at the beginning of this year we have taken on support, maintenance, and enhancements for the products.
August 11, 2020
Cloud Computing Demystified – Part 3
The Risks & Challenges
September 19, 2019
File Server security (Part 3) – Securing your Windows File Servers
In this third and final part of “File Server Security”, we will put the final touch on our file server security recipe
December 17, 2018
File Server security (Part 2) – Securing your Windows File Servers
Protect file servers from unnecessary internet access and make it more difficult for potential attackers to access the server
October 24, 2018
File Server Security (Part 1) – Securing your Windows File Servers
A lot of companies are transitioning from file server-based storage to SAN’s, cloud-based storage, or hybrid solutions, depending on what best fit the business needs.
October 09, 2018
Payment Card Industry Data Security Standard – A safety feature we all benefit from…
A few months ago, I received a call from American Express…
October 01, 2018
Cloud Computing Demystified – Part 2
In this second part of the cloud computing series, we continue with discussing some of the benefits of cloud computing. And there are many benefits, cloud computing could possibly be the best thing since sliced bread.
September 04, 2018
HIPAA: The Importance of Your Privacy - Part 2
We previously discussed the importance of your privacy, and the fact that we don’t want our personal health information floating around across the internet or exposed to strangers in other ways.
August 27, 2018
Cloud Computing Demystified - Part 1
I was at a dinner party the other night, and after a while a discussion emerged about the mysterious “Cloud”, it’s interesting how many different “realities” people have about what the cloud is.
August 20, 2018