Search

1 to 5 of 5
Sort by

Blog Entry
Security & Identity Management Considerations for Application Development in SharePoint 2013 & Office 365

Security & Identity Management "From the Consulting Trenches" There are a number of security, identity management and authentication considerations when developing custom applications and related features in SharePoint 2013, Office 365, SharePoint Online and Microsoft Azure

Errin O'Connor's profile image

Blog Entry
A Single Identity?

In a comment to a prior post ( http://ermcommunity.org/erm/blog/records-management-20#comment-61 ), James Lappin noted that Facebook and Twitter are pushing to become the identity platforms for the internet and compared this to Microsoft's Active Directory inside the firewall

Jesse Wilkins's profile image

Blog Entry
Understanding Operating in the Hybrid Cloud - Office 365 & SharePoint 2013 - An EPC Group Case Study

HBI/MBI/LBI) Automated site placement based on user input & verification Mission Critical Classification Governance Document IT manually creates site in “special” environment Automated site placement bin redundant data-center based on user input & verification Enforcement Scope – How to Enforce (EPC Group Example) Governance Provisioning Tools (EPC Group Example) Object in SharePoint 2013 and/or Office 365 Automatable Create Site Collections Create Sub Webs Create Hierarchy Available on Office 365 People | My Sites | Social ✓ ✓ ✓ ✓ Web Parts | Apps ✓ ✓ List Templates (STP and XML) ✓ ✓ Web Templates (WSP and XML) ✓ ✓ ✓ Site Quotas ✓ ✓ Web Event Receivers ✓ ✓ ✓ SPD Workflows and Actions ✓ ✓ ✓ * ✓ Feature Stapling ✓ ✓ ✓ ✓ * Workflows ✓ ✓ ✓ ✓ Site Definitions ✓ ✓ ✓ ✓ Timer Jobs ✓ ✓ ✓ ✓ Custom Site Provisioning Handlers ✓ ✓ ✓ ✓ Matching the Policy to the Office 365 and/or SharePoint 2013 Scope (EPC Group Example) Policy Type Scope Possible Options Security\ Identity Management Farm Web Application Provisioning workflows Timer Jobs Web application polices DNS/Infrastructure Reactive reporting Farm Web Application Sites/Webs Timer Jobs External Database Event Receivers Proactive Sites/Webs Custom Forms Event Receivers Feature Receivers Custom Field Controls Auditing Farm Web Application Timer Jobs External Database Changes Sites/Web Features Control Delegates Considerations in Complex Environments • Multi-tenancy ( Office 365 Issues when a user goes outside of I.T. to create a new “environment”) • Multiple farms • Hybrid on-premise and off-premise • Security (FBA, SAML claims, Extranets) • Global Clients with PHI, PII, Safe Harbor, Intellectual Property , EU Pushback, NSA Concerns in recent news Frequently Asked Questions of EPC Group • Terms of Service • Common user interface and navigation • Site directory and Office 365 and/or SharePoint 2013 ’s new Layout • Common header and footer content (standardize and creation of governed branding guide) • Structured provisioning with workflow • Site Mapping | Mapping the Owner to Content • BYOD \ "Bring Your Own Device" Strategies (Mobility) • Custom Branding | Responsive Design in Office 365 \ SharePoint 2013 • Site Backup and Restore (DR) and Archival EPC Group’s Nationally Recognized Practice Areas EPC Group leading SharePoint , Office 365 , Infrastructure Design and Business Intelligence Practice areas continue to lead the way in providing our clients with the most up-to-date and relevant information that is tailored to their individual business and functional needs. Additional "From the Consulting Trenches" strategies and methodologies are covered in EPC Group's new book, " SharePoint 2013 Field Guide: Advice from the Consulting Trenches" covering not only SharePoint 2013, Office 365 and SharePoint Online but Information Management, ECM\RM and overall compliance strategies in this ever changing world of " Hybrid IT

Errin O'Connor's profile image

Blog Entry
Social – Mobile – Scared

You can find more detailed highlights of the event on the Chapter website but I want to focus on a few things that cross the line between security and information management and I’d be remiss in one of my duties if I didn’t hype the Chapter network again

Daniel Antion's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

When and if a breach occurs, this team will spring into action to assess the gravity of the breach, gather the financial and logistical resources necessary to respond, and act as a central point of communication and coordination between executive management and boots-on-the-ground responders

Megan Mohrmann's profile image