Wednesday 31 August 2016

Google Apps Now Prefers Okta for Businesses

Businesses using Google will now be encouraged to use Okta for identity verification and device management.

from Tom's IT Pro
via CERTIVIEW

Security+ Question of the Week: BYOD Compliance

SecurityQOW05When an employee brings in their own PED to use on the company network, the process used to bring it into compliance with the BYOD policy is commonly known as?

A. Forensics
B. PTZ
C. On‐boarding
D. RTO

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

Best IT Trainer Certifications For 2017

IT trainers must stay on top of the technologies they're teaching and know how to effectively share their knowledge with students. Here are five credentials that will help them do just that.

from Tom's IT Pro
via CERTIVIEW

Best Time and Attendance Software

Looking for the best time and attendance software? We evaluate and rank TSheets, TimeForce, stratustime and our other top picks.

from Tom's IT Pro
via CERTIVIEW

Tuesday 30 August 2016

Windows 10 Professional vs. Enterprise: What's Best for Business?

Windows 10 Professional may or may not be enough for your small to medium-sized business. Find out if Enterprise is for you.

from Tom's IT Pro
via CERTIVIEW

Two Great Security Features of VMware’s NSX Network Virtualization Platform

VMwareNSXBlogThe VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.

There are quite a few built-in services that are a part of NSX that enhance security. More than just micro-segmentation, including — the distributed firewall, security groups, IPsec VPN, NSX edge firewall, data security, and server activity monitoring. Third-party services can also be integrated such as antivirus, intrusion prevention, vulnerability management, as well as identity and access management.

This post focuses on two features: the distributed firewall and security groups.

VMware NSX Platform’s Distributed Firewall

The distributed firewall is spread across ESXi hosts and is enforced as close to the virtual machine traffic source. The distributed firewall runs as a kernel service within ESXi, providing excellent throughput. By adding more ESXi hosts to a cluster, the distributed firewall throughput capacity increases.

The NSX distributed firewall can be used to enforce stateful firewall services for virtual machines, enforcing at the virtual machine’s vNIC. All inbound (after Virtual Extensible LAN [VXLAN] Tunnel Endpoint — also called VTEP — as well as de-encapsulation) and outbound (before VTEP encapsulation) can be inspected with firewall policies. NSX’s distributed firewall rules are based on Layer 2 through Layer 4.

Distributed firewall rules differ by the layer to which it corresponds:

  • Layer 2 rules are based on MAC address, which include protocols such as ARP, LLDP and others.
  • Layer 3 rules are based on IP address
  • Layer 4 rules designate TCP or UDP service port

With third-party integration, security features through Layer 7 may be implemented. These policies are created in vCenter Server using the vSphere Web Client.

VMware NSX Platform’s Security Group

Security groups can be extremely powerful when combined with a security policy or firewall rule. Security groups allow the grouping of an object collection within a vSphere inventory. After a security group is created, policies may be attached to it. One clever feature the ability to determine group membership by using several criteria. This criterion is determined by a set of conditions that must be matched; this can include guest operating system type, virtual machine name, computer name (in guest operating systems), security tag or entity. Additionally, exclusions may be set to ensure that certain inventory objects are not included in the group.

Firewall rules can be created as a part of the security policy applied to the virtual machines contained within the security group. The Service Composer components provisions and assigns network and security services to applications.

The VMware NSX platform changes the way networking and security services are provisioned. It allows greater visibility (including being able to determine the virtual machines’ names as well as their operating systems). This allows for more granular management and security, allowing (for example) — creating firewall rules at the vNIC level.

Combining this level of flexibility and functionality with the rest of VMware’s offerings, the NSX platform is a powerful aspect of the data center.



from
CERTIVIEW

What is a Mobile Rootkit?

Rootkits are at the heart of the spyware industry that steals financial information. Find out how the mobile versions get in and how to get them out.

from Tom's IT Pro
via CERTIVIEW

Monday 29 August 2016

Businesses Can Legally Operate Drones Now

Thanks to a newly released document that outlines FAA and Department of Transportation rules, businesses can now put drones to work.

from Tom's IT Pro
via CERTIVIEW

CCNA Collaboration Question of the Week: Cisco TelePresence Management Suite

CCNAQuestionWeek16Which four features are provided by Cisco TelePresence Management Suite (TMS)? (Choose four.)

A. Scheduling of video conference calls
B. Built-in-bridge functionality for multiparty video conferences
C. SIP-H.323 protocol interworking
D. Centralized management of conference resources
E. SMTP email event notification
F. Endpoint configuration backup and restore
G. Cisco TelePresence endpoint automated redundancy
H. Automated resource optimization

 

Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0

Related Certification
CCNA Collaboration

Learn more about Cisco Collaboration training.



from
CERTIVIEW

Beware of Ransomware: A Security Alert for Your Employees

The average employee could use this reminder about the dangers of modern cybercrime and how to protect the company.

from Tom's IT Pro
via CERTIVIEW

Tech Professionals in Finance, Healthcare Earn More

The best salaries go to IT professionals in technology, finance and healthcare. It also helps to live in California. Find out what else is in the Puppet DevOps survey.

from Tom's IT Pro
via CERTIVIEW

Friday 26 August 2016

Best Hosted VoIP Solutions for Business

See what today's VoIP and unified communications solutions have to offer and get an overview of the top five current SMB and enterprise VoIP/UC solutions.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Layer 3 Card

ccnpQoW03

Which statement about the Layer 3 card on the Cisco Nexus 5500 Series Switch is true?

A. BGP is not supported, but RIP, EIGRP, and OSPF are supported.
B. Up to two 4-port cards are supported with Layer 3 forwarding capability.
C. Up to 16 FEX connections are supported.
D. Port channels cannot be configured as Layer 3 interfaces.

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center



from
CERTIVIEW

Microsoft Offers VMWare Switchers Free Windows Server 2016 Licenses

Starting September 1, Microsoft will be offering free Windows Server Datacenter licenses to those that switch from vSphere to Hyper-V.

from Tom's IT Pro
via CERTIVIEW

Thursday 25 August 2016

Best Microsoft Word Add-Ons for IT Professionals

With the right communication tools for Microsoft Word you can make sure you sway your manager with your next business plan or proposal.

from Tom's IT Pro
via CERTIVIEW

Soft Skills Your Boss Cares About

Soft skills, such as leadership ability, creativity and playing the long game, are among those that your boss values.

from Tom's IT Pro
via CERTIVIEW

Wednesday 24 August 2016

Security+ Question of the Week: NoSQL vs. SQL Database

securityQOW02What is the primary distinction between a NoSQL database and a SQL database?

A. One supports structure query language expressions, while the other does not.
B. One handles structured data, while the other handles big data.
C. One is implemented using open source technologies, while the other uses commercial code.
D. One is useful for private networks, while the other is used only in the cloud.

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

Best Employee Mobile Device Policies Share These Four Things

Creating a mobile device management policy doesn’t need to be daunting. Just follow these four characteristics.

from Tom's IT Pro
via CERTIVIEW

How to Create Phone Trees for Business Phone Systems

The best business VoIP services feature automated attendants and virtual receptionists to route calls. Creating an effective phone tree requires a little know how.

from Tom's IT Pro
via CERTIVIEW

Apple macOS Sierra: The Big IT Updates

Apple's new operating system, macOS Sierra, is coming. Find out what you need to know about its best new IT and business-centric features.

from Tom's IT Pro
via CERTIVIEW

Tuesday 23 August 2016

Best Unified Communications Certifications For 2017

These unified communications certifications are in demand in 2017. Find the most valuable UC certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Teradata Certification Guide: Overview and Career Paths

Teradata is a global leader in solutions and services for big data and analytics, data warehousing, and marketing applications. The company offers certifications for Teradata and Aster IT professionals.

from Tom's IT Pro
via CERTIVIEW

Monday 22 August 2016

The Other Network: Why Personal and Professional Mingling Matters

Establishing and maintaining personal and professional networks helps you manage life and career.

from Tom's IT Pro
via CERTIVIEW

CCNA Collaboration Question of the Week: Cisco TelePresence SX Endpoint

CCNAQuestionWeek18You want to configure a Cisco TelePresence SX endpoint to use static IP addressing for the TFTP server. Which path will you use to complete this configuration?

A. Network Services > Network 1 > DHCP RequestTFTPServerAddress> Off
B. Network > TFTP > DHCP RequestTFTPServerAddress> Off
C. Network Services > TFTP > DHCP RequestTFTPServerAddress> Off
D. Configuration > System Configuration > Provisioning > Set the External Manager Address

 

Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0

Related Certification
CCNA Collaboration

Learn more about Cisco Collaboration training.



from
CERTIVIEW

What is Ransomware?

Ransomware is malware that wiggles its way into your system and then encrypts your files, only releasing them when you pay the criminals.

from Tom's IT Pro
via CERTIVIEW

Friday 19 August 2016

Microsoft Brings PowerShell to Linux and Mac

Microsoft just gifted developers with open source PowerShell that's available for Linux and Mac.

from Tom's IT Pro
via CERTIVIEW

Best Lenovo Laptops for Business

The best Lenovo ThinkPad laptops for business offer solid security, manageability and high-quality components. Check out our top-rated picks here.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Cisco Nexus 7000 Line Cards

ccnpQoW04

Which two statements about Cisco Nexus 7000 line cards are true? (Choose two.)

A. M1, M2 and F1 cards are allowed in the same VDC.
B. M1, M2 and F1 cards are not allowed in the same VDC.
C. F line cards are Layer 3 only.
D. M line cards support Layer 2, Layer 3 and Layer 4 with large forwarding tables and a rich feature set.
E. The F2 line card must reside in the admin VDC.

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center



from
CERTIVIEW

Help Desk Institute (HDI) Certification Guide: Overview and Career Paths

HDI, or Help Desk Institute certifications are great for IT newcomers and those moving into senior roles. Here's what you need to know.

from Tom's IT Pro
via CERTIVIEW

Thursday 18 August 2016

SOTI MobiControl v13 Mobile Device Management Review

With SOTI MobiControl v13 organizations can use device and application management while enabling users with public and organization-specific productivity tools.

from Tom's IT Pro
via CERTIVIEW

Google Chrome OS for Work: What You Need to Know

The Chrome operating system could be the solution to your company's next hardware upgrades. However, there are a few facts you should have before you decide.

from Tom's IT Pro
via CERTIVIEW

Wednesday 17 August 2016

How To Set Up And Configure DNS On Windows Server 2016

Domain Name System (DNS) is central to TCP/IP hostname resolution and Active Directory itself. Learn to install and configure the DNS Server role in Windows Server 2016.

from Tom's IT Pro
via CERTIVIEW

Building a Business Case for a Cloud Monitoring Solution

You know cloud monitoring can help you improve productivity and general operations. You just have to convince your boss. Here's how.

from Tom's IT Pro
via CERTIVIEW

Security+ Question of the Week: Dismiss Alarms

SecurityQOW04

Which element of assessment or monitoring causes the security staff to discount the value of alarms?

A. False positives
B. Fuzzing
C. Excessive policy
D. Password cracking

 

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

Tuesday 16 August 2016

Goodbye Patch Tuesday: Windows 7, 8.1 Patches Go Monthly

Microsoft will deliver patches for Windows 7, 8.1, Server 2008 and Server 2012 on a monthly basis, starting in October.

from Tom's IT Pro
via CERTIVIEW

Azure RemoteApp is Dead. Long Live XenApp Express

Microsoft is sundowning Azure RemoteApp, in favor of Citrix XenApp Express, which is a result of a new collaboration between the two companies.

from Tom's IT Pro
via CERTIVIEW

IT Training vs Certifications: What's the Difference?

There are many ways to distinguish between training and certification programs, some hinging on they way they use subject matter experts (SMEs).

from Tom's IT Pro
via CERTIVIEW

Best Free Software Defined Networking (SDN) Training and Materials

Software-defined networking, aka SDN, is to networking as virtual machines are to physical computers. Here are the best free ways to get up to speed.

from Tom's IT Pro
via CERTIVIEW

Monday 15 August 2016

Best Free Project Management Training Materials for IT Pros

Project management skills are in high demand in nearly every IT specialty. Here's where to find the training you need, for free.

from Tom's IT Pro
via CERTIVIEW

Why VPNs Are Essential for Small Businesses

A Virtual Private Network can help protect your company's data and help you scale to support remote workers.

from Tom's IT Pro
via CERTIVIEW

CCNA Collaboration Question of the Week: Cisco Video Communication Server

 

CCNAQuestionWeek12Which three features does the Cisco Video Communication Server provide? (Choose three.)

A. Native Cisco SCCP integration
B. SIP-H.323 interworking functionality
C. Native scheduling
D. SIP trunk integration with Cisco Unified Communications Manager
E. Third-party standards-based H.323 and SIP device registration
F. Reverse proxy

 

Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0

Related Certification
CCNA Collaboration

Learn more about Cisco Collaboration training.



from
CERTIVIEW

Friday 12 August 2016

Microsoft Extends Support Deadline for Intel Skylake

If your company is running computers with the Intel Skylake CPU (6000-series Core i5 or Core i7), you have more time to run Windows 7 and 8.1 than you thought. Microsoft has extended its deadline for supporting the security, reliability and compatibility

from Tom's IT Pro
via CERTIVIEW

Business Phone Services: Best Picks and Buying Guide

Which business phone service is right for your small-to-medium business? We’ve narrowed the best choices for IT professionals to the top three: Nextiva, RingCentral and ShoreTel.

from Tom's IT Pro
via CERTIVIEW

CCNP Data Center Question of the Week: Scalability in OTV

ccnpQoW05

Which statement about scalability in OTV is true?

A. The control plane avoids flooding by passing MAC reachability information.
B. IP-based functionality provides Layer 3 extension over any transport.
C. Any encapsulation overhead is avoided by using IS-IS.
D. Unknown unicasts are handled by the authoritative edge device.

 

Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0

Related Certification
CCNP Data Center



from
CERTIVIEW

Best IT Jokes. Ever.

There's only so many times you can tell people to turn if off and back on again before you need a giggle. Check out our top 10 jokes that the average Joe won't get.

from Tom's IT Pro
via CERTIVIEW

Thursday 11 August 2016

Video Series from MVA Could Help You Ace Your MS Certification

I suppose it was inevitable: because the Microsoft Virtual Academy (MVA) offers so much cert-related video training and courseware, why shouldn’t they have a video that explains how to prepare for Microsoft Certification exams? That’s exactly what you’l

from Tom's IT Pro
via CERTIVIEW

Six Sigma Certification Guide: Overview and Career Paths

Find out what Six Sigma means to organizations and the kinds of employees who can benefit from Six Sigma certification.

from Tom's IT Pro
via CERTIVIEW

Wednesday 10 August 2016

Delta's Virtual Crash and How to Avoid Your Own

Ultimately, Delta’s aging equipment caused a series of dominoes to fall, but your business can avoid that trap.

from Tom's IT Pro
via CERTIVIEW

CEH v9 Question of the Week: Password Attack Method

CEH-v9-QOWGreenKelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she is asked to perform is an external audit. The IT manager thought that Kelly would be a great candidate for this task since she does not work for this other agency and is an accomplished IT auditor. The first task that she is asked to perform is an attempt to crack user passwords. Since Kelly knows that all state agency passwords must abide by the same password policy, she believes she can finish this particular task quickly.

What is the best password attack method for Kelly to use in this situation?

A. Kelly can produce the best and fastest results if she uses a dictionary attack.
B. A hyberfil-based password attack is the best method of password cracking in this scenario.
C. She should utilize the reverse-encryption password cracking technique since she knows the password policy.
D. Kelly should use a rule-based attack on the agency’s user passwords.

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

What is Microsoft Azure Stack?

What you need to know about Microsoft's Azure Stack hybrid cloud platform.

from Tom's IT Pro
via CERTIVIEW