Security

Mobile app security is our priority, from timely patches that fight malware and hacks to the basics of physical security. Adhering to OWASP Top 10 security standards we have you covered.


ALHD Security Services:

  • ALHD Security Services surpasses our competition in meeting the standards of what a security guard company consists of in the industry today. As a security provider we provide much more than to deter, detect and report. ALHD Security Services is the next generation of contract security providers. We know what it takes to keep you and your business safe, but more importantly, we know how to add value to your company by providing superior customer service and attention to detail. We take ownership of every customer’s company and property. We are proud of what you and your company have accomplished and ensure that each of our security guards displays that pride to you and your customers through their appearance and attitude.
  • At ALHD Security Services, we care about our customers and their business. We focus on detail that will bring your company to the forefront in your industry. At ALHD Security Services, we will add value to your company by providing you more than a deterrent; we will provide that first impression and customer service that will set your company ahead of your competition.
  • Call us at ALHD Security Services and let us show you how we make the difference in the service we provide.

Spotlight

Union Hospital turbocharged database and application performance by 6x

We actually had clinics calling us up to say how much faster the apps were running once they were in a pure Virtual SAN environment. It seems like the more things we migrate to Virtual SAN, the more people are requesting to be on it.
Read Case Study

NHS Chooses ALHD Hyper-Converged Software for Cloud Service Delivery

National Health Service UK evolved its virtualized IT environment into an efficient IaaS platform with ALHD HCS. The agency deployed Virtual SAN to improve performance, enhance scalability and simplify management.
Read Case Study

Cloud Carib propels performance and productivity with ALHD Hyper-Converged Software

Our customers are surprised by the speed and responsiveness of their applications. Cloud Carib now has the ability to host any demanding application a customer wants to run.
Read Case Study

Legacy Infrastructure is running out of control

Why Enterprises Are Embracing Hyper-Converged Infrastructure (HCI)
Learn More

Hyper-Converged Infrastructure Webcasts

Learn how hyper-convergence can save you money, simplify operations, and increase IT agility.

Free Registration

Virtual Blocks Blog

Gain insights and perspective on hyper-converged infrastructure from our experts.

Free Registration

Features

ObserveIT has many special features that make it the ultimate enterprise-class user activity recording and auditing technology solution. But here are the top 5 that make us stand out as unique and powerful.

Authorization Manager

Authorization Manager has been improved in the Windows Server® 2008 operating system with several new features and improvements. Authorization Manager provides a flexible framework for integrating role-based access control into applications. It enables administrators who use those applications to provide access through assigned user roles that relate to job functions. Authorization Manager applications store authorization policy in the form of authorization stores that are stored in Active Directory Domain Services (AD DS), Active Directory Lightweight Directory Services (AD LDS), XML files, or SQL databases


BitLocker Drive Encryption

BitLocker™ Drive Encryption (BitLocker) is a security feature in the Windows Vista® and Windows Server® 2008 operating systems that can provide protection for the operating system on your computer and data stored on the operating system volume. In Windows Server 2008, BitLocker protection can be extended to volumes used for data storage as well.

Encrypting File System

Encrypting File System (EFS) is a powerful tool for encrypting files and folders on client computers and remote file servers. It enables users to protect their data from unauthorized access by other users or external attackers.


Security Configuration

With the Security Configuration Wizard (SCW), you can reduce the attack surface of a computer running the Windows Server® 2008 operating system by customizing the security settings of server roles.

What does the Security Configuration Wizard do?

The Security Configuration Wizard (SCW) guides you through the process of creating, editing, applying, or rolling back a security policy. It provides an easy way to create or modify a security policy for your server based on its role. You can then use Group Policy to apply the security policy to multiple target servers that perform the same role. You can also use SCW to roll back a policy to its prior configuration for recovery purposes. With SCW, you can compare a server's security settings with a desired security policy to check for vulnerable configurations in the system. The version of SCW in Windows Server 2008 includes more server role configurations and security settings than the version of SCW in Windows Server 2003. Also, by using the version of SCW in Windows Server 2008, you can:

Disable unneeded services based on the server role.
Remove unused firewall rules and constrain existing firewall rules.
Define restricted audit policies.


Once a security policy is created with SCW, you can use the Scwcmd command-line tool to: Apply the policy to one or more servers. Roll back policies.
Analyze and view an SCW policy on multiple servers, including compliance reports that can show any discrepancies in the configuration of a server.
Transform an SCW policy into a Group Policy object (GPO) for centralized deployments and management by using Active Directory Domain Services (AD DS).

User Account Control

User Account Control (UAC) is a new security component of the Windows Server® 2008 and Windows Vista® operating systems.

What does User Account Control do?

UAC allows an administrator to enter credentials during a non-administrator's user session to perform occasional administrative tasks without having to switch users, log off, or use the Run as command. UAC also can also require administrators to specifically approve applications that will make "system-wide" changes before those applications are allowed to run, even in the administrator's user session.

Who will be interested in this feature?

Understanding the operation of UAC is important for the following groups:

Administrators
IT security professionals