Questions? Give us a call: 877-788-1617 Live Chat: Offline
Download FREE MOBILE DEVICE SECURITY REPORT

365mobility

Do you know how many cloud applications are being accessed by your employees?
Are your employees sharing valuable information via emails and attachments?
Is Your Help Desk Inundated with Password Reset Requests Over and Over?
Get Started With A FREE Trial Get Started With A FREE Trial Request a Consultation Request a Consultation Download FREE MOBILE DEVICE SECURITY REPORT

About 365mobility

This author has not yet filled in any details.
So far 365mobility has created 62 blog entries.

Connecting With Microsoft Graph API

Microsoft Enterprise Mobility + Security and the Microsoft Graph API
Across the more than forty thousand customers that Enterprise Mobility + Security (EMS) serves today, there’s a notable diversity in how they organize their IT resources to enable mobile productivity for their workforce. Each customer uniquely defines their mobile strategy and IT structure through a series […]

By |March 21st, 2017|Blog, Uncategorized|0 Comments

Azure Information Protection: Get ready to set and protect

Azure Information Protection
With the adoption of mobility and cloud services, data is traveling to more locations than ever before. While it has helped users become more productive and collaborative, securing and monitoring the data has become harder.

Our goal with this blog is to help you address some of these information protection challenges regardless of where […]

By |March 14th, 2017|Blog|0 Comments

Introducing Azure Active Directory and SailPoint

Microsoft has worked closely with their largest customers in highly regulated industries like healthcare, financial services etc., helping them to successfully deploy and  actively use Azure AD Premium. Because of this close partnering, in order to meet their unique security and compliance requirements, they need some pretty advanced access governance controls across their on-premises and […]

By |February 21st, 2017|Blog|0 Comments

Azure MFA cloud based protection for on-premises VPNs is now in public preview!

Preview Azure MFA
One of the top requests we hear from our customers is to be able to secure their on-premises VPNs using Azure AD and our cloud-based MFA service. On 2/6 Microsoft was announcing the public preview of NPS Extension support in Azure MFA. This cool enhancement gives you the ability to protect your VPN […]

By |February 8th, 2017|Blog|0 Comments

Microsoft Intune 2016 – the year in review

Microsoft Intune 2016
Where you are today is not where you will be tomorrow. Things change fast these days. Regardless of your industry, you’re always in motion – evolving and adapting to the shifting needs of your business and workforce. Microsoft Intune 2016  gives you a diverse set of tools for managing your complex mobile environment […]

By |January 31st, 2017|Blog|0 Comments

Eliminate Plaintext Passwords With Microsoft Advanced Threat Analytics Using LDAP

Introduction to Microsoft Advanced Threat Analytics:  It is incredibly important to identify applications, servers, and sensitive accounts that should be using encryption. What we find all too frequently, however, is that passwords are being sent in plaintext in most enterprises. Here’s what you need to know about identifying these vulnerabilities and, more importantly, how to […]

By |January 9th, 2017|Blog, Uncategorized|0 Comments

Do you need a cloud access security broker (CASB) in addition to your firewall?

Why do I need a cloud access security broker (CASB) when I have my trusted firewall? A CASB will help you protect your cloud and SaaS apps from cybersecurity attacks, insider threats, and potential data loss.

 
Firewalls vs Cloud Access Security Broker (CASB)
 

Firewalls are like your front line perimeter of protection. They show you the category […]

By |January 3rd, 2017|Blog, Uncategorized|0 Comments

Will Advanced Threat Analytics help me with all OS?

Will Microsoft’s Advanced Threat Analytics (ATA) help me detect suspicious activity on my network, regardless of the operating systems in my environment? “YES!” is the short answer. Any user or entity that connects to the network via Active Directory (AD), queries the DNS servers, or authenticates with AD is inspected for anomalous activities, regardless of the […]

By |December 20th, 2016|Blog, Uncategorized|0 Comments

New Features Coming to Microsoft Enterprise Mobility + Security (EMS)

Microsoft Enterprise Mobility + Security (EMS)
 

With Microsoft Enterprise Mobility + Security (EMS) we continue to build on identity at the core of the solution to maximize your employees’ productivity while at the same time providing the necessary capabilities across security, management of devices and apps, and information protection to ensure that your critical company data […]

By |December 12th, 2016|Blog, Uncategorized|0 Comments

Azure Information Protection and Cloud App Security Integration

Cloud App Security: Extend Control Over Your Data to the Cloud
At Ignite, Microsoft had showcased the integration between Cloud App Security and Azure Information Protection in the Cloud App Security session and Azure Information Protection session. We are excited to share more about this integration and also demonstrate how it helps in extending security for […]

By |November 16th, 2016|Blog, Uncategorized|0 Comments