Select Page
clipboard_image_0.png

Premier Offerings: System Center Configuration Manager and Intune Power BI Dashboard Integration

Introduction As SCCM Engineers we have all been asked at some stage about custom dashboards and reports that are available or that can be created to monitor the SCCM environment, check the status of client activity, client health, deployments or ... continue reading

Unlocking the promise of IoT: A Q&A with Vernon Turner

Vernon Turner is the Founder and Chief Strategist at Causeway Connections, an information and communications technology research firm. For nearly a decade, he’s been serving on global, national, and state steering committees, advising governments, businesses, and communities on IoT-based solution ... continue reading
Lab Architecture.png

Build a SQL Cluster Lab Part 1

This article is Part 1 in a series of articles showing how to build a SQL Cluster Lab. It covers building a Windows Cluster in Hyper-V that supports both Availability Groups and Failover Cluster Instances. Once you build the environment, ... continue reading
INfographic of the five app templates.

Building retail solutions with Azure IoT Central

Azure IoT Central is an IoT app platform for solution builders that simplifies the challenges of building and deploying scalable and affordable enterprise grade IoT applications. Across the retail industry, the use of connected devices to deliver business performance continues ... continue reading
Co-Management of Windows Updates Workloads

Co-Management of Windows Updates Workloads

This post is about co-managing the Windows Update policies workload between Configuration Manager and Intune. Overview Organizations today are looking for an integrated endpoint management platform which can ensure all devices whether owned by the business or personally owned stay ... continue reading
Top 5 use cases to help you make the most of your Cloud Access Security Broker

Top 5 use cases to help you make the most of your Cloud Access Security Broker

The number of apps and the flexibility for users to access them from anywhere continues to increase. This presents a challenge for IT departments in ensuring secure access and protecting the flow of critical data with a consistent set of ... continue reading
Diagram showing app automation driving business processes with Flow. The diagram shows Flow, PowerApps, and Power BI circling CDS, AI Builder, and Data Connectors.

Foundations of Microsoft Flow—secure and compliant automation, part 1

Automation services are steadily becoming significant drivers of modern IT, helping improve efficiency and cost effectiveness for organizations. A recent McKinsey survey discovered that “the majority of all respondents (57 percent) say their organizations are at least piloting the automation ... continue reading
Update Compliance on Co-Managed Devices

Update Compliance on Co-Managed Devices

Your organization may be interested to block access to corporate resources (Like E-Mail, SharePoint, etc.) based on Software Updates compliance of the device. What does it mean for the end user? Simply put, they should have the most recent patches ... continue reading
Placeholder

IRAP protected compliance from infra to SAP application layer on Azure

This post was co-authored by Rohit Kumar Cherukuri, Vice President – Marketing, Cloud4C Australian government organizations are looking for cloud managed services providers capable of providing deployment of a platform as a service (PaaS) environment suitable for the processing, storage, ... continue reading
Chart showing vulnerability, patch release, and outbreak. Vulnerability: MS08-067; Patch release: October 23, 2008; Outbreak: late December 2008. Vulnerability: MS17-010; Patch release: March 14, 2017; Outbreak: May 12, 2017. Vulnerability: CVE-2019-0708; Patch release: May 13, 2019; Outbreak column shows three question marks.

Protect against BlueKeep

Worms are the cause of many cyber headaches. They can easily replicate themselves to spread malicious malware to other computers in your network. As the field responders providing Microsoft enterprise customers with onsite assistance to serious cybersecurity threats, our Detection ... continue reading