Select Page
WhoIAM: Enabling inclusive security through identity protection and fraud prevention

WhoIAM: Enabling inclusive security through identity protection and fraud prevention

Greetings, This is Sue Bohn, Director of Program Management for Identity and Access Management. In this Voice of the Partner blog post, we’ve invited Ajith Alexander, Head of Product Management at WhoIAM, a leading identity and access management (IAM) company, ... continue reading

Drive successful data-driven transformation—go limitless with Azure data

Over the past year, it's become clear that no business is immune to sudden changes. Embracing data as a strategic asset is key to remaining agile amidst uncertainty. Data can provide crucial insights to help you navigate complex situations, empower ... continue reading
Create automation task for an Azure resource

Manage your Azure resources using automation tasks

There are different ways to manage your Azure resources depending on your specific needs. With automation tasks, Azure offers a simple way to manage a specific resource or resource group using automation task templates. These templates depend on the Azure ... continue reading
Azure Security Products.PNG

What's the difference between Azure Security Center, Azure Defender and Azure Sentinel?

It's common to have a pre-defined perspective when you hear the word "security". Some people think of applications being configured correctly or insecure coding practices. Some people think of identity concepts like password spray attacks, phishing or multi factor authentication ... continue reading

Azure Availability Zones in the South Central US datacenter region add resiliency

As businesses move more workstreams to the cloud, business continuity and data protection have never been more critical—and perhaps their importance has never been more visible than during the challenges and unpredictability of 2020. To continue our commitment to supporting ... continue reading
magdysalem_0-1611108265970.png

Secure Application Lifecycle – Part 2- Secure DevOps Kit for Azure (AzSK)

In my previous blog I addressed the issue of managing credentials in the code and presented two different alternatives to secure it. In this post, I will focus on Azure subscription security health and its challenge. I could summarize the ... continue reading
mark_serafine_0-1610111977713.png

Introduction to Microsoft Azure Government Secret

Disclaimer: The purpose of this article is only to call attention to Microsoft’s new cloud service (Azure Government Secret), highlight its public features/services, and provide general guidance for those Microsoft customers who are eligible to use these new services. For ... continue reading

Using Entity Framework Core with Azure SQL DB and Azure Cosmos DB

Jeremy Likness shows Scott Hanselman how to use Entity Framework (EF) Core with Azure SQL DB and Azure Cosmos DB. EF Core is a lightweight, extensible, open source, and cross-platform version of the popular Entity Framework data access technology.[0:00:00]– Overview[0:01:43]– ... continue reading
Diagram of a high-level view of the global Azure.com architecture.

How Azure.com operates on Azure part 2: Technology and architecture

When you’re the company that builds the cloud platforms used by millions of people, your own cloud content needs be served up fast. Azure.com—a complex, cloud-based application that serves millions of people every day—is built entirely from Azure components and ... continue reading

Cost optimization strategies for cloud-native application development

Today, we’ll explore some strategies that you can leverage on Azure to optimize your cloud-native application development process using Azure Kubernetes Service (AKS) and managed databases, such as Azure Cosmos DB and Azure Database for PostgreSQL. Optimize compute resources with ... continue reading