Select Page
Adrian_Rupp_0-1590519050548.png

Part 3 (Portal) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Create a Key Vault using the Azure Portal This is Part: AP3 (Azure Portal) of a 4-part blog series: This blog in the series provides the step-by-step instructions to create an Azure Key Vault using the Azure Portal. To grant ... continue reading
Adrian_Rupp_0-1590518598997.png

Part 2 (Portal) – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Set up an Azure Active Directory service principal using the Azure Portal This is Part: AP2 (Azure Portal) of a 4-part blog series: This blog in the series provides the step-by-step instructions to configure Azure Active Directory using the Azure ... continue reading
Adrian_Rupp_0-1590518231834.png

Part 1 – SQL Server TDE and Extensible Key Management Using Azure Key Vault

Install the SQL Server Connector for Microsoft Azure Key Vault This is Part:1 of a 4-part blog series: This blog in the series installs the SQL Server Connector for Microsoft Azure Key Vault. This DLL is the provider that allows ... continue reading
EKM_Intro.png

Intro – SQL Server Transparent Data Encryption and Extensible Key Management Using Azure Key Vault

Welcome to my blog series on setting up SQL Server TDE to use Azure Key Vault. I’m a Program Manager with the Azure SQL Security Team / Product Group and I will walk you through the process of configuring the ... continue reading
Mobile Device Management (MDM)

Zero Trust Deployment Guide for devices

The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy. Whether a device is a ... continue reading

Biometrics – Keep Your Fingers Close

Here’s a common customer question, especially in manufacturing, government-to-citizen, and kiosk scenarios: “ I want a system where my user can walk up to any system, then scan a fingerprint (or look at a camera, or speak into a mic, ... continue reading

Microsoft Build brings new innovations and capabilities to keep developers and customers secure

As both organizations and developers adapt to the new reality of working and collaborating in a remote environment, it’s more important than ever to ensure that their experiences are secure and trusted. As part of this week’s Build virtual event, ... continue reading

Backup storage consumption on Managed Instance explained

Automated backups on Managed Instance Database backups are an essential part of any business continuity and disaster recovery strategy because they protect your data from accidental corruption or deletion. Azure SQL Managed Instance automatically creates the database backups that are ... continue reading

Fine tuning backup storage costs on Managed Instance

In the previous article, we have explained how automated backups on Managed Instance work, how are backups piling up, how you can cause backup pile up and associated costs for excess backup storage. In this article you will learn how ... continue reading
Diagram showing how the Thunderspy attack works

Secured-core PCs help customers stay ahead of advanced data theft

Researchers at the Eindhoven University of Technology recently revealed information around “Thunderspy,” an attack that relies on leveraging direct memory access (DMA) functionality to compromise devices. An attacker with physical access to a system can use Thunderspy to read and ... continue reading