Questions? Give us a call: 877-788-1617 Live Chat: Offline
Download FREE MOBILE DEVICE SECURITY REPORT

Blog

Do you know how many cloud applications are being accessed by your employees?
Are your employees sharing valuable information via emails and attachments?
Is Your Help Desk Inundated with Password Reset Requests Over and Over?
Get Started With A FREE Trial Get Started With A FREE Trial Request a Consultation Request a Consultation Download FREE MOBILE DEVICE SECURITY REPORT

Azure Active Directory B2B collaboration

Azure Active Directory B2B collaboration now generally available
Azure AD B2B collaboration is generally available now and is part of Microsoft Enterprise Mobility + Security (EMS). Businesses are increasingly dispersed, mobile, and collaborative, relying on wide range of vendors, partners, and contractors to stay nimble and capitalize on changing markets. Azure Active Directory (AD) is the […]

By |April 14th, 2017|Blog|0 Comments

New EMS and Skycure Integration Helps Ensure Devices are Risk Free

New EMS and Skycure integration helps ensure devices are risk free before accessing corporate resources
 

On 3/27 Microsoft was thrilled to announce the general availability of their integration with Skycure, a leader in the mobile threat defense space. The integration between Skycure and Microsoft Enterprise Mobility + Security gives organizations more confidence that devices are risk-free […]

By |March 30th, 2017|Blog|0 Comments

Connecting With Microsoft Graph API

Microsoft Enterprise Mobility + Security and the Microsoft Graph API
Across the more than forty thousand customers that Enterprise Mobility + Security (EMS) serves today, there’s a notable diversity in how they organize their IT resources to enable mobile productivity for their workforce. Each customer uniquely defines their mobile strategy and IT structure through a series […]

By |March 21st, 2017|Blog, Uncategorized|0 Comments

Azure Information Protection: Get ready to set and protect

Azure Information Protection
With the adoption of mobility and cloud services, data is traveling to more locations than ever before. While it has helped users become more productive and collaborative, securing and monitoring the data has become harder.

Our goal with this blog is to help you address some of these information protection challenges regardless of where […]

By |March 14th, 2017|Blog|0 Comments

Introducing Azure Active Directory and SailPoint

Microsoft has worked closely with their largest customers in highly regulated industries like healthcare, financial services etc., helping them to successfully deploy and  actively use Azure AD Premium. Because of this close partnering, in order to meet their unique security and compliance requirements, they need some pretty advanced access governance controls across their on-premises and […]

By |February 21st, 2017|Blog|0 Comments

Azure MFA cloud based protection for on-premises VPNs is now in public preview!

Preview Azure MFA
One of the top requests we hear from our customers is to be able to secure their on-premises VPNs using Azure AD and our cloud-based MFA service. On 2/6 Microsoft was announcing the public preview of NPS Extension support in Azure MFA. This cool enhancement gives you the ability to protect your VPN […]

By |February 8th, 2017|Blog|0 Comments

Microsoft Intune 2016 – the year in review

Microsoft Intune 2016
Where you are today is not where you will be tomorrow. Things change fast these days. Regardless of your industry, you’re always in motion – evolving and adapting to the shifting needs of your business and workforce. Microsoft Intune 2016  gives you a diverse set of tools for managing your complex mobile environment […]

By |January 31st, 2017|Blog|0 Comments

Eliminate Plaintext Passwords With Microsoft Advanced Threat Analytics Using LDAP

Introduction to Microsoft Advanced Threat Analytics:  It is incredibly important to identify applications, servers, and sensitive accounts that should be using encryption. What we find all too frequently, however, is that passwords are being sent in plaintext in most enterprises. Here’s what you need to know about identifying these vulnerabilities and, more importantly, how to […]

By |January 9th, 2017|Blog, Uncategorized|0 Comments

Do you need a cloud access security broker (CASB) in addition to your firewall?

Why do I need a cloud access security broker (CASB) when I have my trusted firewall? A CASB will help you protect your cloud and SaaS apps from cybersecurity attacks, insider threats, and potential data loss.

 
Firewalls vs Cloud Access Security Broker (CASB)
 

Firewalls are like your front line perimeter of protection. They show you the category […]

By |January 3rd, 2017|Blog, Uncategorized|0 Comments

Will Advanced Threat Analytics help me with all OS?

Will Microsoft’s Advanced Threat Analytics (ATA) help me detect suspicious activity on my network, regardless of the operating systems in my environment? “YES!” is the short answer. Any user or entity that connects to the network via Active Directory (AD), queries the DNS servers, or authenticates with AD is inspected for anomalous activities, regardless of the […]

By |December 20th, 2016|Blog, Uncategorized|0 Comments