Microsoft 365
MAM and Intune: Sandboxing Corporate Data
In line with all of Microsoft’s products, Intune is designed to deliver top security for corporate data while optimizing user productivity. In this case, we’re focusing specifically on mobile devices and their apps. Intune is Microsoft’s Enterprise Mobility + Security (EMS) component that manages that area. Let’s take a look at the difference between mobile…
Read MoreMicrosoft 365 Plans for Education
Educational institutions face the cybersecurity risks of other organizations and more. Because of certain factors inherent to the nature of educational places, these institutions are at a greater security risk. Limited budgets, privacy concerns, intellectual property, and specific compliance regulations create an atmosphere that’s different from most organizations. The multiplicity of college departments makes for…
Read MoreConnect to WVD from Anywhere
Connect to WVD (Windows Virtual Desktop) from anywhere, on any device. Learn how to turn your iPad Pro into a WVD thin client with a bluetooth mouse.
Read MoreWVD Pricing Guide (Windows Virtual Desktop)
WVD was released in preview back in March, and our step-by-step guide to deploy WVD is one of our most popular posts. Pricing for WVD has been known for a few months, but today Microsoft formally announced that Windows Virtual Desktop is now Generally Available (GA) worldwide. Let’s take a look at the total cost…
Read MorePricing for Azure Sentinel is GA
After being in Preview since February 2019, Microsoft just announced the General Availability and pricing for Azure Sentinel today! As a Gold Microsoft Partner with competencies in Azure Cloud Platform, DevOps, Security, and Enterprise Mobility, we’re excited to announce that we are adding co-managed SIEM and SOAR to our Secqur Aether services starting on day…
Read MoreShared Responsibility Matrix for Cloud Services
When migrating to the cloud, organizations sometimes mistakenly assume that the cloud service provider (CSP) takes on the role of securing their data and maintaining compliance. While the CSP does have many responsibilities in these areas, it’s important to remember that the customer is also responsible. The service model you choose dictates your accountability in…
Read MoreShadow IT Discovery with Microsoft Cloud App Security
Apps! You run the world! I can just hear Beyonce’s voice in my head–mainly because I just listened to it on Google Play Music. And by continuously monitoring Shadow IT Discovery with Microsoft Cloud App Security (MCAS), which is built-in natively on Windows 10 devices, Azure also knows that I just listened to Google Play…
Read MoreMicrosoft Intune for Unified Endpoint Management Leads in Gartner’s UEM Magic Quadrant 2019
When vision and capability are combined, magic happens. Perhaps that’s why the research company called their visual assessment the Magic Quadrant: it places companies on a scale measuring their completeness of vision with their ability to execute, and then gives them a label of a niche player, challenger, visionary or leader depending on where they…
Read MoreGo Passwordless With Microsoft 365
Using SMS for MFA and resetting passwords every 90 days is a losing game. People write passwords on sticky notes, and your phone carrier will let hackers port your phone number to a new SIM card. Going passwordless with biometric unlocks is the only way forward. Your phone can unlock with your fingerprint or FaceID,…
Read MoreStep-by-Step Guide to Configure Valimail for DMARC Monitoring With Office 365 and Azure SSO
Last month, Microsoft announced that anyone with an active Office 365 subscription can configure Valimail for DMARC monitoring for free! Great! But what the heck does that mean? In simple terms, it means you can eliminate 40-70% of phishing and spoofing attacks on your domain, and you’re going to help make the Internet a safer…
Read More