Tags
2019-05-29
Previously, we discussed the subject of zero-trust network security, but at the Security and Compliance Virtual Conference that took place recently, experts talked a lot about zero-trust architecture …
2019-05-07
As the new technologies evolve and in the online-first world we migrate our lives to the web, legislation appears to protect the individual's privacy as they share sensitive personal data on the Inter…
2019-05-03
Here’s the comparison table comparing different licensing channels, primarily month-to-month subscriptions and volume licensing.
2019-05-01
Use your Android device to snap a photo of a printed data chart. Insert it in Excel and watch your image convert to a spreadsheet!
2019-05-01
With these capabilities, users can easily apply sensitivity labels to documents and emails based on the labels defined by your organization. The experience is built directly into Office apps, with no …
2019-04-29
#advanced threat protection #cloud security #microsoft 365 #microsoft azure #office 365
Perimeter-based networks protected by a firewall are familiar to anyone because they were so common. But the key word is “were,” because they are outdated now. They function assuming that machines and…
2019-04-15
The key to success for any business is working smarter instead of working harder. The idea of cloud technologies that can make your work a lot easier is very tempting. That sounds great to the busines…
2019-04-05
Meetings in Teams include audio, video, and sharing. And because they're online, you'll always have meeting space and never need a room or projector. Teams meetings are a great way to come together wi…
2019-04-04
Possible scenarios – hybrid Azure AD join and Autopilot for existing devices
2019-03-28
Scenarios for Windows Autopilot – User-driven, Reset, Self-deploying modes