Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 11
Sort by

Blog Entry
First Impressions of Microsoft Intune Endpoint Manager for MDM to an Intune Endpoint Manager Noob

Please enjoy this blog post authored by Mark Manoukian, IT Director, Kegler, Brown, Hill & Ritter. In 2011, Microsoft introduced an MDM solution known as Intune. Without knowing anything specific about it, at all, Intune was and is immediately attractive to some of us for the reason...

Mark Manoukian's profile image

Blog Entry
Different sides of the same coin? How IT and Innovation departments can work together

Lately, I found myself working at the busy intersection of established legal IT department and recently created KM Innovation group in the law firm I am in. Both departments have their similarities and differences: IT is the powerhouse of technical expertise while Innovation looks better...

Alisher Yuldashev's profile image

Blog Entry
Strategies for Improving Collaboration Between IT and Legal - Takeaway

Please enjoy this brief takeaway from the May 1st roundtable discussion entitled "Strategies for Improving Collaboration Between IT and Legal." It is important for Legal to have an IT dedicated team and for that collective team to have shared goals. o If you don’t have a dedicated IT...

Blog Entry
Mimecast vs. Proofpoint Comparison

Hello! We thought it would be beneficial to provide the membership a comparison of Mimecast v. Proofpoint, especially given the popularity of the e-group conversations regarding these technologies. Attached you'll find three documents: Mimecast Breakdown - describes the Mimecast...

Charlie Altenbach's profile image

Blog Entry
Clonezilla - A No Cost Disk Imaging Solution

I'm sure many of us have at some time or other utilized a software-based disk imaging/cloning solution. Norton Ghost was one of the first I ever used and it was awesome. Heck, I'm even going to assume that a few of us have used hardware-based disk imaging equipment. My firm dropped a few...

Blog Entry
Threat Intelligence Sharing is Real!

As humans, our nature is to collaborate. We are social beings; we work together, learn from each other, help one another, and entertain. This is why threat intelligence sharing has become such a hot topic for IT professionals. But, there are better ways to share than what we have seen in the...

Blog Entry
Open Source IDS Products

So, I was perusing some of the usual junk mail I receive and I came across a great article about the top 10 Open Source IDS tools (you can, and should, read it here ) and it prompted this quick blog post. IDS can be a fickle b&$%*. There are many great tools available, some free, some...