Keep your privileged access secure with Azure AD PIM and PAM in Office 365: Part 1

Edward Walton, Cloud Solution Architect In this month’s community call, we’ll be covering “just-in-time” identity management and administration in Microsoft Azure Active Directory (AD) Privileged Identity Management (PIM) and Privileged Access Management (PAM) for Office 365. We’ll show how it can help partners and their customers prevent account and access breaches associated with Global Administrators…


Friends don’t let friends compromise security: Extending cybersecurity to supply chains

Network attacks are on the rise, and as with all things security, it’s always best to get ahead. This summer, the Wall Street Journal ran a story about Russian hackers infiltrating “air-gapped” networks of US utility companies with “relative ease” as just one part of a tale that’s becoming all too common. The NY Times…


Security and Windows session recommendations for Microsoft Inspire

I hope everyone is excited about Microsoft Inspire 2018. We are just over a week away from the event, and if you’re like me, you’re now finalizing your schedule by choosing the sessions you most want to attend. There are plenty to choose from this year, with a good mix of business development and product…


Modern Workplace Quarterly Update

We are hosting our second Modern Workplace Quarterly Update call on Friday, March 9 at 1 pm Eastern Time. Modern Workplace is the solution area that includes Microsoft Office 365, Microsoft Enterprise Mobility + Security, and Windows and Devices. Our regular call participants know that we have separate monthly calls to cover these solutions under…


Taking the Shadow out of “Shadow IT”

Matt Soseman, Partner Technical Architect, Modern Workplace – Security Edward Walton, Cloud Solution Architect, Modern Workplace – Security You may not realize it, but your organization is already operating in the cloud. Even if your IT department hasn’t deployed cloud services yet, your employees already have, and your organization is 100% responsible for the security…


Drive professional services engagements with Microsoft funded security offerings for partners – Part 2 of 2

Edward Walton, Cloud Solution Architect Be sure to join the January 16 Modern Workplace: Security Partner Community call for part 2 of our presentation on Microsoft funded security assessments, previewed below. Miss part one? Read the overview and watch the community call on-demand. Continuing our community call series on Microsoft funded security assessments, our January…


Modern Workplace Quarterly Update

Microsoft regularly announces product updates to its Productivity, Enterprise Mobility + Security (EM+S), and Windows & Devices solutions. Join the Modern Workplace Partner Community call on December 8 to hear about the recent developments. Microsoft develops dynamic solutions that constantly evolve to meet customer needs. EM+S is a great example. When that solution first came…


Drive professional services engagements with Microsoft funded security offerings for partners – Part 1 of 2

Edward Walton, Cloud Solution Architect Often, the first step in a successful customer security and compliance engagement is an assessment of the customer’s current environment during the pre-sales process, but partners are sometimes at a loss on how to get started. The good news is that Microsoft offers funded assessment initiatives that partners can use…


EMS Partners: Microsoft Intune – mobile application management and proofs of concept

One of my favorite things to talk about and demonstrate is Microsoft Intune mobile application management. Many companies want to protect their corporate data, while still giving employees flexibility and choices for what devices they use. Companies also want to avoid over-controlling a user’s personal devices. Microsoft Intune mobile application management provides a solution that…


EMS Partners: Focus on Secure Productive Enterprise

For partners and their customers, security is at the forefront of every conversation. At Microsoft, we continue to listen to our audience and add services to our portfolio that help protect against attacks, detect when an attack is occurring, and respond through guidance and/or automation. Many of these additions reside in the products that make up…