Microsoft Advanced Threat Analytics

Tracking down security vulnerabilities has always been a game of cat and mouse. Certain safeguards can be put in place to prevent security vulnerabilities such as blocking firewall ports, requiring multi-factor authentication and so on. Granted, no system can capture every single security vulnerability, however if a layered security approach is taken, there’s a better…

0

The World of Mobility

It’s difficult to ignore the world of mobility. We often carry a one or more devices such as a Windows PC, Mac, iPhone, Android, and so on.  Additionally, we bring these devices into the workplace and connect to applications, email, and files. This isn’t anything new, however the complexity of juggling devices and managing them…

0

Transitioning Blog to Enterprise Mobility Talk

Hello Everyone, First off, thank you for your readership over the past couple years. You may know my blog as an infrastructure blog focusing on Windows Server, System Center, Identity, and Microsoft Azure. However, recently I’ve transitioned roles within Microsoft and I am now a Mobility Technical Specialist focusing on device management, identity, and information…

0

Identity as a Service IDaaS

It seems like there is a lot of discussion going on lately about identity. In fact it’s a very hot topic among most of the organizations I speak with. However identity is not a new topic, there are just better technologies available to manage identity and more companies providing identity solutions. In the past, identity…

1