Learn the differences between modern device management and traditional device management and how these impact the future of IT management.| The Quest Blog
Poorly protected user accounts threaten Microsoft 365 tenants. Learn how to strengthen security with Conditional Access policies.| The Quest Blog
As hybrid work, M&A activity, and regulatory complexity surge, IT leaders face a new dilemma in Microsoft 365: Should we migrate our tenants or should we connect them using multi-tenant organization (MTO) features? This is no longer a purely technical decision — it’s a strategic choice with deep implications for cost, user experience, security, and […] The post MTO vs. migration in Microsoft 365: finding the right fit for your organization appeared first on The Quest Blog.| The Quest Blog
Master Conditional Access: uncover key components, real-world examples and strategies aligned with users and business needs.| The Quest Blog
The Quest blog is an industry-leading source of helpful security, data management, migration and Microsoft 365 content for IT professionals.| The Quest Blog
You’ve made the architectural leap to a data lakehouse. Your infrastructure is in place, your pipelines are running, and your data scientists are excited about AI. But if you haven’t designed your lakehouse with modeling and governance in mind, you’re not AI-ready; you’re just one step closer to another data swamp. This post picks up […] The post Data lakehouse architecture: Ensure AI can understand and trust your data appeared first on The Quest Blog.| The Quest Blog
Uncover security risks from device discovery gaps—and learn how regular scans can keep your IT asset inventory up to date.| The Quest Blog
Tony Redmond explores why Entra ID is more than a classic directory, and a true cornerstone of Microsoft 365.| The Quest Blog
Application assessment is a crucial element of IT migration, modernization, cloud transition, and broad-scale security projects. A thorough evaluation of your application portfolio helps you ensure that your project is efficient and cost effective, and that the “after” environment will enable secure and efficient operations. This article explores what an application assessment is, the key […] The post How application assessment drives smarter business strategies appeared first on The Qu...| The Quest Blog
This post is the second in a series on data lakehouses, expanding on the key insights shared in “Data lakehouse benefits: Why enterprises are choosing this modern data architecture”. In that article, we explored the reasons behind the rapid adoption of lakehouse platforms and how they blend the flexibility of data lakes with the governance […] The post Data lakehouse strategy: Build a foundation for real-time, AI-ready insights appeared first on The Quest Blog.| The Quest Blog
Active Directory backup has been an important topic for a long time. Today however, with identity-based attacks on the rise and AI empowering a broader base of threat actors, several aspects of the process have taken on new urgency. This blog post explains what you need to know to ensure you have the Active Directory […] The post Active Directory backup strategies you need today appeared first on The Quest Blog.| The Quest Blog
Coverage of Databricks Data + AI Summit 2025, where Databricks presented a roadmap of what lies ahead for enterprise data.| The Quest Blog
October 14, 2025, marks the official end of support for Windows 10. That date is a little too close for comfort when you consider the complexity and scope of a successful enterprise-wide operating system (OS) migration. This isn’t just a routine IT upgrade. This is a business continuity challenge that requires immediate attention from executive […] The post It’s the end of support for Windows 10. Do you feel fine? Or will you be fined? appeared first on The Quest Blog.| The Quest Blog
If AI hasn’t blown our minds yet, Snowflake Summit 2025 made it clear what’s coming soon will. I flew into San Francisco expecting some solid updates and left feeling like I’d seen the blueprint for the next era of enterprise AI. The conference radiated with ambition, energy and the promise of “breathtaking” models that unlock […] The post Snowflake Summit: Key takeaways from a week of AI, data and dog robots appeared first on The Quest Blog.| The Quest Blog
Discover five essential Active Directory security best practices to defend against modern identity-based threats and insider privilege abuse.| The Quest Blog
Learn when and how to use the SQL PARTITION BY clause in SQL Server and how it differs from the GROUP by clause.| The Quest Blog
Discover a multitude of use cases for the SQL CASE statement and how it applies business logic to SQL Server.| The Quest Blog
Explore 5 MySQL performance tuning tips about how you can use queries to study wait times and objects, find bottlenecks and improve SQL code.| The Quest Blog
Learn all about database monitoring: what it is, how to perform it and the top metrics to keep your eye on.| The Quest Blog
Learn why data modeling is essential for your Oracle to Snowflake migration and how to modernize with confidence.| The Quest Blog
Learn what Zero Trust is, key identity types, and how to build a strong Zero Trust identity strategy with steps and best practices.| The Quest Blog
Learn the three misconfigurations in Active Directory that impact the security of Entra ID and how to best reduce those risks.| The Quest Blog
Discover how applying a 4-step plan for managing GPOs will improve your Active Directory security strategy.| The Quest Blog
The experts who built and maintained Active Directory are retiring. Learn how to prepare for the upcoming Active Directory retirement crisis.| The Quest Blog
Many Active Directory misconfigurations are simple to identify and resolve. Discover how to mitigate them.| The Quest Blog
Learn why Office 365 groups are a critical element of Microsoft cloud environments, how they are created and strategies for managing them.| The Quest Blog
Discover what Azure AD Conditional Access is, does your organization need to use it, and how to set it up.| The Quest Blog
Check out this guide to learn what enterprise-level Entra ID recovery strategies are needed to mitigate risk and business disruption.| The Quest Blog
Learn what a cloud data warehouse is, the challenges and risks of adopting this model and what to consider when choosing the right solution.| The Quest Blog
A guide to legacy application modernization. Learn eight steps for launching the project and building your strategy.| The Quest Blog
With a DataOps architecture, you can get more out of the investment you’re making in analytics by addressing how data is delivered.| The Quest Blog
Patching vulnerabilities proactively is a must. Learn the security risks of missed patches and best practices for effective patch management.| The Quest Blog
Disasters come in all shapes and sizes - learn how to develop your own strategy for disaster recovery data loss and how to reduce downtime.| The Quest Blog
Explore IT asset management (ITAM) best practices, common mistakes to avoid and guidance on how to approach it.| The Quest Blog
Learn about the types of insider threats, their common characteristics and how to harden your network against them.| The Quest Blog
As companies work to secure an ever-increasing range of devices against increasing threats, they face 7 common endpoint security challenges.| The Quest Blog
Learn how high availability architecture keeps systems operational during outages and aims to reach five 9s of availability.| The Quest Blog
Learn what data democratization is, why it’s important and how it gives users a 360-degree view of data so they can make timely decisions.| The Quest Blog
Consider the following benefits of data governance for achieving greater efficiency, improved compliance, and better decision-making.| The Quest Blog
Discover how the Active Directory password policy has evolved and the key settings to consider and be aware of.| The Quest Blog
Learn why the Active Directory skills shortage is more critical athan in other areas of IT and the steps you can take to prepare for it.| The Quest Blog
Explore how Group Policy is being abused and why it is a powerful tool for both defenders and adversaries.| The Quest Blog
Learn about Kerberos authentication vulnerabilities and how to mitigate your risk| The Quest Blog
Discover the definition of Microsoft service accounts and explore 10 effective practices for their efficient management.| The Quest Blog
Learn what you need to include and address when planning a data quality management strategy for your organization.| The Quest Blog
Let's explore the ins and outs of Azure AD migration, consolidation and restructuring in Part 4 of our What is Azure Active Directory series.| The Quest Blog
Discover essential insights on hybrid Azure Active Directory security and learn about compliance best practices.| The Quest Blog
Discover common Azure Active Directory management tasks, including group management and backup and recovery.| The Quest Blog
Let's explore the ins and outs of Active Directory migration, consolidation and restructuring in Part 4 of our What is AD series.| The Quest Blog
Dig into Active Directory security and compliance to uncover what you need to do to keep your Microsoft environment secure and compliant.| The Quest Blog
Explore Active Directory management including common tasks, OUs, GPOs, gaps native Active Directory admin tools leave behind and more.| The Quest Blog
Learn how Azure AD Connect works, what data it syncs and best practices to apply when using it in your Active Directory environments.| The Quest Blog
Learn the most common Active Directory attacks, how they unfold and what steps organizations can take to mitigate their risk.| The Quest Blog
Active Directory security groups play a critical role in controlling access to your vital systems and data. Learn how they work.| The Quest Blog
Businesses cannot operate without Active Directory up and running. Learn why and how to develop a comprehensive Active Directory disaster recovery strategy.| The Quest Blog
Secure your Active Directory against potential risks with these 8 best practices and ensure robust security measures for your system.| The Quest Blog
Active Directory delivers key authentication services so it’s critical for migrations to go smoothly. Learn 5 Active Directory migration best practices.| The Quest Blog
Endpoints are always the entry point for data breaches. Learn 7 endpoint security best practices that can help successfully reduce your risk.| The Quest Blog
Learn why data silos are problematic, how they prevent teams from gaining a strategic view over data and discover tips to break them down.| The Quest Blog
Enhance your organization's cybersecurity posture by adopting these recommended patch management best practices.| The Quest Blog
Ensure that you're doing all the right things as a corporate citizen and a custodian of people’s data with sensitive data management.| The Quest Blog
Learn more about security risks, challenges and best practices of BYOD endpoint management that should be considered.| The Quest Blog
Learn all about BYOD pros and cons and how to strike a balance between corporate security and employee convenience.| The Quest Blog
Disaster recovery testing is a best practice to ensure recovery plans work across organizational backup-and-recovery processes. Learn how to get started.| The Quest Blog
Assessing IT risk in an uncertain economy means organizations need to assess and prioritize IT investments based on the risks and challenges they face.| The Quest Blog
Becoming a data-driven organization—sustainably—is a distinct challenge. Consider these 6 mistakes companies should avoid.| The Quest Blog
Get insights from 220 IT professionals about their key challenges and investments in their data intelligence and data governance initiatives.| The Quest Blog
Proving data quality enhances trust in a business’ data. Explore these 6 data quality best practices to get started.| The Quest Blog
Discover data governance best practices that organizations should use as a guide to defining and achieving data governance.| The Quest Blog
Learn how additional enhancements to the 3-2-1 backup strategy can give you better protection against attacks and ransomware.| The Quest Blog
Data deduplication is the process of identifying and eliminating duplicated data. Learn how it works and how it improves backup storage use and time.| The Quest Blog
Having your databases in more than one place at a time has many advantages. Learn how to do data replication in three important areas.| The Quest Blog
Learn about the types of air gaps you can use to reduce your attack surface and eliminate the ransomware attack vector targeting backups.| The Quest Blog
Dive into the 4 key areas necessary to establish a robust data recovery plan, a vital component for every organization.| The Quest Blog
Learn how Kerberoasting attacks on Active Directory unfold, why attackers love them, and key ways to combat them and improve security.| The Quest Blog
The principle of least privilege used to be foreign in a Windows network. Learn what it is and why the cyber industry is now mandating its implementation.| The Quest Blog
Learn about the critical cybersecurity concept of attack surface reduction (ASR) and how it relates to the security of Active Directory.| The Quest Blog
Remote device management is crucial for IT pros trying to keep data secure. Consider what's needed to get it right and mistakes orgs make.| The Quest Blog
Insider threat detection is critical to a cybersecurity strategy. Learn the types of threats and how to best detect and combat them.| The Quest Blog
Learn how to implement your data protection strategy and reduce costs without reducing your data protection.| The Quest Blog
Learn how software supply chain security works, its biggest threats, and best practices organizations can implement to improve their defense.| The Quest Blog
Active Directory forest is a critical — but often underappreciated — element of the IT infrastructure. Learn what it is and how to manage it.| The Quest Blog
Every organization needs a solid ransomware recovery strategy to combat the potential devastation of ransomware attacks. Here are a few best practices to get started.| The Quest Blog
Discover the essentials of multifactor authentication (MFA): its definition, available technologies, and the pros and cons of each.| The Quest Blog
Set recovery time and recovery point objective and tune your backup and recovery strategy to avoid disruption when disaster strikes.| The Quest Blog
Password spraying, credential stuffing, brute force attacks—the similarities extend beyond their names. Learn how they work and how to prevent them.| The Quest Blog
Learn the importance of reviewing your MFA implementation and identify potential opportunities for improvement.| The Quest Blog
Learn everything you need to know about attack vectors - what they are, who launches them and how to defend your network.| The Quest Blog
Learn how to avoid becoming a victim and defend against ransomware by creating a strong ransomware protection strategy.| The Quest Blog
Learn what configuration drift is in AD, what causes it, and effective strategies to prevent and mitigate it at your organization.| The Quest Blog
Learn what can be done to increase your organization’s security posture and how tier 0 assets like Active Directory come into play.| The Quest Blog
Modernizing Active Directory offers a wealth of benefits. Learn the top considerations to keep in mind so you can modernize with confidence.| The Quest Blog
Discover Active Directory Certificate Services and learn to identify and secure vulnerabilities in this crucial authentication service.| The Quest Blog
Explore practical do’s and don’ts that should be considered when developing BYOD policies for your organization.| The Quest Blog
Privilege escalation attacks are a critical threat. Learn what they are, how they work and key best practices to defend against them.| The Quest Blog
Unlock IT bandwidth by addressing challenges in implementing automated patch management within organizations.| The Quest Blog
Learn the importance of patch management to keep your software ahead of vulnerabilities that may become threats.| The Quest Blog
Learn what Active Directory is, how you can manage and secure it, and how your organization can start using it.| The Quest Blog
Learn how to establish a data governance framework and understand its central role in successful data governance implementation.| The Quest Blog
Explore the concept of continuous data protection, understand its functioning, and discover best practices for its implementation.| The Quest Blog