global teams

Wrangling Notes Client Security

When I started working with Lotus Notes in 1994, there was only the Lotus Notes client in the client server model. Majority of the workstations were located in the same geographical location on the same LAN as the server and remote users were also Lotus Notes clients that dialed in to the server via a modem. For the most part Read More

Domino Health Audit 11_17

Domino Database Security & Database Design Element Security

Securing Notes Databases Diving through the layers of securing Domino, we are now at database security. For any Notes database be it a mail file or an application the front door for getting in the database is the database’s Access Control List. Hence, it is imperative that you develop ACL standards and enforce them to control not only data access Read More

Domino Health Audit 11_17

Notes IDs – The Backbone of the Domino Security Model

The Domino and Notes security model is rooted in its ID files, formidable keys that are unique to each Domino installation. The loss or compromise of any Notes ID results in a recovery process, especially time consuming if that ID happens to be an Organization or Organizational Unit certificate. Properly storing and maintaining your Notes certifier, user and server IDs Read More

peaking blinds

The Stuff Outside of IBM Domino That Keeps Me Up at Night

The security of the Domino system is influenced by the physical location of the Domino server, Operating System configuration and network access points. It is important to understand how these can impact Domino. Physical Security Common security sense says that the servers of any application should be stored in a data center that has some type of controlled access. While Read More

ibmsecurity

Domino Server Security – There are 10 Things You Need to Know

In the past I have rolled my eyes at top 10 lists. Then, about a year ago I became enthralled with the “Hamilton” soundtrack. Composer Lin Manual Miranda conveys the concept of duels in “Ten Duel Commandments”, listing the 10 rules of engagement. Towards the end of the musical, the 10 list is reprised in The “World Was Wide Enough,” Read More

Petya-Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware Don’t let your guard down just yet. While the threat of last month’s WannaCry ransomware has just about disappeared, a new threat is already on the rise. The cyberattack is believed to have hit its first targets in Ukraine. Going after the central bank, main airport as well as the Chernobyl nuclear Read More

Domino Health Audit 11_17

IBM Connections: 20 New Use Cases

IBM Connections: 20 New Use Cases Internal Communications 1) Engage Employees: Turn the typical one-way communication into a real dialog by listening to and responding to employees. 2) Branding & Design: Customize the user interface by adding personalized layouts or company watermarks to maintain the corporate identity. 3) Business Units: Easily create and manage content across the various communities for Read More

big-data-lock

Make Use of Existing Lotus Domino Investments to Gain Business Intelligence

The Problem with Lotus Domino While the Lotus Domino server is a highly capable, standards-based platform, it is largely under-utilized and misunderstood.  Data goes into Notes applications with little to no hope of getting it out, and more often than not applications are not meaningfully exposed to thin clients, existing only in the isolation of the Notes client. Over the Read More

Domino Health Audit 11_17

Essential Tools – Patrolling IBM Domino Environments for Over a Decade

Essential Tools (ET) is an robust, Beacon award-winning server-based IBM Domino Administration tool designed to assist Domino administrators perform their tasks significantly more efficiently and also allow them to fulfill certain tasks that the infrastructure did not allow them to do so before. The robustness of ET stems from the basic architectural fact that the Domino Infrastructure information (Database, ACL, Read More

Domino Health Audit 11_17

Exception Reporting with Essential Agent Master

If you think Domino Domain Management in ND9 is the answer… think again Essential Agent Master goes beyond DDM to build a complete picture of agent performance, with the ability to correct errors on-the-spot, by gathering extensive agent information from four disparate locations: + Server Settings + Agent Settings + Agent Run Log + Notes Log Exception reporting is a Read More