East of Eden

The latest in Windows 10, end user devices and services, cyber security, data center & cloud, and all things IT.

Blog Feature

End User Devices and Services | Windows 10

Top 10 Tips for IT Project Managers Migrating to Windows 10: Part 1

By: Andrew Sweeney
January 17th, 2017

Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the experts’ first five tips with the remaining being posted in part two of this blog (check those out here). For detailed planning guidelines, check out our eBook, Planning for Windows 10 Starts Now.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Top 10 Tips for IT Project Managers Migrating to Windows 10: Part 2

By: Andrew Sweeney
January 17th, 2017

Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the five of the experts’ top tips with the remaining being posted in part one of this blog (check those out here).

Read More

Share

Planning for Windows 10 Starts Now

Planning for Windows 10 Starts Now

Develop a transition strategy for a successful Windows 10 upgrade, and make this migration your best.

Blog Feature

End User Devices and Services

Secure Boot: Stop Rootkits Dead in Their Tracks by Converting from BIOS to UEFI

By: Andy Sherman
October 25th, 2016

As outlined in our previous article, Windows 10 Security, The Good, The Bad, and The Ugly, there are several exciting new security features in Windows 10 Enterprise, such as Device Guard and Credentials Guard, that leverage features of more recent hardware. In order to take full advantage of all that Windows 10 Enterprise has to offer, you will probably need to convert a lot of existing boot drives from BIOS to UEFI, and when you do that, you will also want to enable the Secure Boot feature of your workstation hardware. Sound opaque and confusing? This article will explain what it means and talk about some strategies for making the conversion in your enterprise.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Use Windows 10 Device Guard to Trust Your Software

By: Andy Sherman
October 17th, 2016

As we noted in our Windows 10 Security overview, one of the exciting new features of Windows 10 Enterprise is Device Guard, an operating system feature for ensuring that only trusted code runs on your systems. At its best, Device Guard uses a signature based model for trusting executables and libraries. However, in an ecosystem with as much legacy as exists in Windows, Device Guard also gives the enterprise the means to handle legacy applications as well.

Read More

Share

Blog Feature

Cyber Security

SPF and DKIM are useful, but not a panacea

By: Andy Sherman
September 29th, 2016

The following article was written by Eden's own Andy Sherman. It originally appeared on his blog, "My Security Musings." I received an interesting phishing email today. It was from a business acquaintance and contained a link gussied up to look like an online document. The content and format of the email screamed "suspect me" so I did. A URL lengthener confirmed that the tinyurl.com link went someplace having no connection to me or the acquaintance.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Using Spreadsheets to Run Your Windows 10 Migration is a Recipe for Disaster

By: Andrew Sweeney
September 28th, 2016

If you’ve run one of these projects before, then you already know this is true. If you haven’t, let's quickly break down the problem:

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Windows 10 Budgeting Made Easy

By: Andrew Sweeney
September 27th, 2016

Creating a Windows 10 migration budget doesn’t have to be all that difficult. While the final cost will be based on a number of variables and some in-depth analysis, the budget range can really be determined by answering these four questions:

Read More

Share

Blog Feature

Cyber Security

6 Simple Steps to Reduce Your Ransomware Risk

By: Andy Sherman
August 4th, 2016

What is Ransomware? It seems that hardly a day goes by that we don’t read about a new strain of ransomware or a new victim of a ransomware attack. Ransomware is malware that encrypts the user’s or organization’s files and demands payment for the decryption key. The ransomware business model is often one that provides friendly customer service and really does deliver the key in exchange for the requested amount of Bitcoin. However, there is no guarantee that they will, and they don’t always, so it’s not a long term strategy for protecting your enterprise to depend upon the good will of criminals.

Read More

Share

Blog Feature

Cyber Security | Windows 10

Windows 10 Security: The Good, the Bad, & the Ugly

By: Andy Sherman
July 11th, 2016

There’s a lot of buzz around Windows 10 security. For example, Infoworld dubs Windows 10 as “the most secure Windows ever.” Although that sounds like the hype cycle at work, in fact, some of the new security features in Windows 10 are game changers that will help change the balance of power between enterprise customers and the perpetrators of Advanced Persistent Threats (APT). There’s also at least one monstrously bad idea baked into Windows 10, and the usual collection of features where we think the default behavior is too open and should be modified.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Reduce Windows 10 Planning Time by 30% with EMMA

By: Eden Technologies
May 12th, 2016

Microsoft’s introduction of Windows 10 in July 2015 set the clock ticking for IT organizations around the world to start mapping out their enterprise migration plans. Whether it’s from Windows 7, 8, 8.1, or an earlier version of the operating system, the process will require a significant investment of time and resources. With thousands of interdependent variables to manage, the process is complex and often difficult to manage. To ensure the process runs smoothly and efficiently requires close management and sophisticated tools.

Read More

Share