Overview to Azure Active Directory

Like most directory services, Azure Active Directory stores information about users and the organizations they belong to. It lets users log in, then supplies them with tokens they can present to applications to prove their identity. It also allows synchronizing user information with Windows Server Active Directory running on premises in your local network. While the mechanisms and data formats used by Azure Active Directory aren’t identical with those used in Windows Server Active Directory, the functions it performs are quite similar.

Understanding Azure Active Directory

It’s important to understand that Azure Active Directory is designed primarily for and used by cloud applications. It can be used by applications running on Azure, for example, or on other cloud platforms. It’s also used by Microsoft’s own cloud applications, such as those in Office 365. If you want to extend your data center into the cloud using Azure Virtual Machines and Azure Virtual Network, however, Azure Active Directory isn’t the right choice. Instead, you’ll want to run Windows Server Active Directory in Virtual Machines.

Read more

Backup Recovery and Security for Mobile Workers

Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Endpoints include PCs, laptops, smart phones, tablets etc.  Today, with the on the go work culture, people are working on a variety of devices, creating data on multiple endpoint devices that they carry with them all over the world, making them susceptible to risk of either getting lost, stolen or critical data being accidentally deleted .Unfortunately, even today not many of us are prepared when such disasters occur. As for those who are aware of endpoint protection, have a relatively easier way to deal with such catastrophes

Endpoint security systems work on a client server model in which a centrally managed server hosts the security program and an accompanying client program is installed on each network device. When a client attempts to log on to the network, the server program validates user credentials and scans the device to make sure that it complies with the defined security policies before allowing access to the network.

mithun

Read more