Policy-Based IT: The Next Frontier?

Chuck's Blog - EMC

  Approached that way, automation becomes about meeting the needs of the application, expressed in a manifest that we refer to here as “policy”.   Indeed, listen to most IT vendors and you’ll hear the word “policy” used liberally.   All driven by policy.

Step-By-Step: Enabling Advanced Security Audit Policy via DS Access


Microsoft understand these modern requirements and with windows 2008 R2 they introduce “ Advanced Security Audit Policy ”. Advanced Security Audit Policy is need to enable via GPO. There for the policy should only target the Domain Controllers.

Trending Sources

The Importance of an Online Encryption Policy


This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Through an online encryption policy, you can mitigate the risks and avoid these cases, whether you’re a profit or a non-profit organization. Creating such a policy involves the participation of the IT department in your organization, and it may or may not include the c-suite executives until it reaches complete implementation.

InfoSec Policies and Standards: Some strategic context for those just diving into this world


Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organization makes different strategies in implementing a security policy successfully. Security policies of all companies are not same, but the key motive behind them is to protect assets.

List of Cyber Threat “Wake-Up Calls” Growing: Policy makers have been hitting the snooze button since 1970


Generally each of the events below was so significant policy makers were loudly proclaiming to all who would listen that they were a wake-up call. This means there are reflections in public policy documents, speeches and the press that cite leaders using the phrase.

What to consider in developing BYOD policy

Network World

Why Have a BYOD Policy? Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security.

Three Reasons Network Security Policy Management is a Big Deal

Data Center Knowledge

Upwards of 95 percent of breaches can be prevented by better managing existing technologies Read More. Data Center World Networking Security

How the CIO Can Establish a BYOD Usage Policy

CIO Dashboard

If you’re grappling with putting policies and procedures in place to manage the consumer-driven transition to a bring-your-own-device workplace (BYOD), don’t worry. Outline the support and repair policies for the equipment. Do you have a BYOD usage policy?

Five Real-World Tips for Creating Corporate Cloud Policies

Data Center Knowledge

It's time to make some new policies. Are you creating a new cloud initiative? Want to start migrating users, apps. and workloads? Read More. Cloud Computing Enterprise Mobility cloud

Schneider Electric Beefs Up Its Family-Leave Policy

Data Center Knowledge

Wants to help employees create healthy balance between work and personal lives Read More. Business Schneider Electric

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

What should an insider risk policy cover?

Network World

A thorough insider risk policy would have spelled it out. Here, security experts provide their insights on what makes for a successful insider risk policy. Just before the holidays, a company was faced with cutting the pay of their contracted janitors. That didn’t sit well with those employees. Threat actors saw an opportunity and pounced, convincing the possibly vengeful employees to turn on their employer.

Security and policy surrounding bring your own devices (BYOD)

IT Pros Rock!

While organizations encourage BYOD for cost savings and productivity, it is also important to have robust security policies supporting BYOD. Clearly define policy to ensure devices support the security functionality required and only use devices that do not accept automatic or prompted certificate renewal.

Ransomware: Protect yourself with good backup and cloud policies

Computer Weekly

More ransomware attacks are likely. The best way to protect against them is to have up-to-date in-house backups and to ensure cloud backups are adequately protected and available

6 Tips for Creating a Unified Communications Policy

IT Toolbox

This article explores the elements of and policies that may apply to UC, offers a couple of examples, and explains theToday’s unified communications (UC) solutions are available in many forms and can be comprehensive and integrated across corporations, with many cross-functional business processes. In smaller companies, they can be simple, without any integration with anything.

Enterprise network access policies must change to account for IoT

Computer Weekly

With IoT devices set to outnumber notebooks, smartphones and tablets by more than three times, businesses will need to adjust their network access policies to keep things running smoothly, says Gartner

Group Policy: Creating A Standard Local Admin Account


Much has been covered thus far in the Group Policy series : How to create a new policy. This post will detail the setup of a group policy.( Windows Server 2012 R2 Windows Server 2012 Active Directory Group Policy MVP Windows Server

Government stresses continuity of broadband policy after election

Computer Weekly

At the Connected Britain conference in London, digital minister Matt Hancock recommits to already-established broadband and mobile networking policy

Sapphire 2017: McDermott declares SAP indirect licensing policy change

Computer Weekly

At SAP’s annual Sapphire Now conference in Orlando, Florida, CEO Bill McDermott rules out of court charging for static read access in third-party systems

Why your company needs clear security policies: A cautionary tale

Tech Republic Security

An IT employee was recently almost fired for storing documents on Dropbox. Here's how the employee and the company could have prevented that situation

Insurer launches UK’s first driverless car policy

Computer Weekly

Specialist motor insurance provider Adrian Flux introduces new contract terms for a driverless car insurance policy

Gaps starting to close in cyberinsurance policies

Tech Republic Security

Insurance companies are starting to fill the loopholes in their cybersecurity products, which could prevent costly lawsuits and angry customers down the road

The Report The Cybersecurity Commission Should Have Sent To the President and President Elect


For policy-makers new to cybersecurity the introduction recaps issues the nation has been dealing with for quite some time now. CTO Cyber Security News Cognitio Computer security Cybersecurity PolicyBob Gourley.

Creating End-User Mobility Policies

Data Center Knowledge

While the Age of Bring-Your-Own-Device has arrived, the implementation is where the underlying challenges start. With all of these devices, how does an IT department manage the data being delivered and how can they continue to provide a powerful end-user experience? Bill Kleyman of MTM Technologies. Industry Perspectives

Group Policy: Creating a New Policy Linked Directly To Its OU


In a previous post, Group Policy: Introducing Consistency Into Your Infrastructure , we covered some basic orientation in the Group Policy interface. We discussed the layout of Group Policy, some of the terms and locations and we covered a way of creating.(

Why your company needs a social media policy

Tech Republic Security

Here's what you need to craft a social media policy to protect your data and avoid legal trouble Half of employees say that their company does not have rules about using social media at work.

Five Rules of Highly Effective BYOD Policies

IT Toolbox

Bring-your-own-device (BYOD) is booming. Nearly three quarters of all organizations now have a BYOD program in place or are working on one, according to Tech Pro Research conducted late last year. There are many good reasons for this trend. BYOD saves money by reducing the number of corporate devices that must be purchased. It enables employees to work from home, a perk that

Step-By-Step: Setting up Printers via Group Policy


In this installment we look at how to setup printers in group policy. As with all the Group Policies created, the policy will apply to all PCs thus enforcing standardization. This is invaluable to IT professionals as it addresses one less thing to check.( read more ).

With Release 2.0 OpenStack Swift Matures, adding Storage Policies

Data Center Knowledge

More efficient data redundancy controls, geographically defined data access policies now available Read More. Cloud Computing Storage

Data 20

Free 5 Feb Workshop Explores Using Sharepoint to Bridge the Gap Between Policy and Technology


As technology executives, we''re often challenged with managing policy requirements and keeping up with technology to support them, while working with limited budgets and a shallow pool of qualified staff. By Charles Hall.

Top 10 Ethical Dilemmas & Policy Issues in Science & Tech

Network World

Reilly Center for Science, Technology and Values has issued its fourth annual list of emerging ethical dilemmas and policy issues in science and technology , and it contains some doozies. You think you have problems? Sure you do, but pity those in science and technology tasked with advancing artificial intelligence, drones and healthcare methods that are fraught with peril despite potentially huge benefits. The University of Notre Dame's John J.

Communication Policies in Your UC Solution

IT Toolbox

However, your company policies may not address these forms of communication Unified communications solutions can introduce many new features for employee collaboration. For instance, instant messengers and team chat rooms work well for remote conversations and quick questions, helping you cut down on unnecessary phone calls, which will improve productivity and free up prioritized network bandwidth.

Implementing Your Company’s Cybersecurity, Military Style

The Accidental Successful CIO

I guess you purchase and install tools that will allow you to detect if the bad guys are able to get in, you create policies for what various people are supposed to do if this happens, and you make sure that your most precious assets are safely hidden away even if the bad guys get in.