Select Page
Diagram of high-level Solorigate attack chain

Increasing resilience against Solorigate and other sophisticated attacks with Microsoft Defender

­Even as investigations into the sophisticated attack known as Solorigate are still underway, details and insights about the tools, patterns, and methods used by the attackers point to steps that organizations can take to improve their defenses against similar attacks ... continue reading
Graph.png

Understanding “Solorigate”‘s Identity IOCs – for Identity Vendors and their customers.

Microsoft recently disclosed a set of complex techniques used by an advanced actor to execute attacks against several key customers. While we detected anomalies by analyzing requests from customer environments to the Microsoft 365 cloud, the attacks generalize to any ... continue reading
GigaOM Cost and Benefits of >NET Application Migration to the Cloud

5 ways to save costs by running .NET apps on Azure

Digital transformation is accelerating at an incredible rate for consumers and employees alike, and the way we live and work has drastically changed. As a result, digital demand is surging, often past the capacity of existing infrastructure due to online ... continue reading

Securing a Windows Server VM in Azure

If you've built and managed Windows Servers in an on-premises environment, you may have a set of configuration steps as well as regular process and monitoring alerts, to ensure that server is as secure as possible. But if you run ... continue reading
f1.png

Are Your IaaS Domain Controllers Secured in Azure?

Hi Everyone, Zoheb here again with my colleague Tim Beasley. Today, we will be sharing some best practices to help ensure that your VMs (virtual machines) (including Domain Controllers) are secure in your Azure/Cloud environment. I would like to start ... continue reading

Azure Stack Hub Partner Solutions Series – BORDONARO IT

This week, Tiberiu Radu (Azure Stack Hub PM) and I, had the chance to speak with Microsoft MVP Dino Bordonaro from Azure Stack Hub Partner BORDONARO IT. BORDONARO IT is an Azure Stack Hub partner and Preferred SI that focuses ... continue reading
Legacy access model

Modernize secure access for your on-premises resources with Zero Trust

Change came quickly in 2020. More likely than not, a big chunk of your workforce has been forced into remote access. And with remote work came an explosion of bring-your-own-device (BYOD) scenarios, requiring your organization to extend the bounds of ... continue reading
Connecting urban environments with IoT and Digital Twins

Connecting urban environments with IoT and Digital Twins

As urbanization continues to take hold and cities face challenges to become more sustainable and livable, urban planning and operations strategies must adapt. The current pandemic has changed the way we live, accelerating cities’ future vision as a necessity of ... continue reading
SAP measurement and sizing metrics, called SAPS, define100 SAPS = 2000 order lines items processed per hour. With the latest SAP HANA-certified Edsv4 VMs, you are now able to further  the costs associated with your SAP environment. As you can see in the chart below, the latest generation smaller memory VMs can achieve the same number of SAPS with up to 50% cost reduction compared to the previous Azure VM families. Additionally, larger memory VM sizes can provide up to 75 percent cost savings compared to previous VMs.

Reduce costs with new memory-optimized Azure Virtual Machines certified for SAP HANA

In June 2020, we announced general availability of Azure general purpose and memory optimized Virtual Machines based on the 2nd generation Intel Xeon Platinum 8272CL (Cascade Lake) to deliver up to ~20 percent CPU performance improvement compared to their predecessors, ... continue reading
RobertLightner_0-1604163327289.png

Using Runbooks to Set Azure Alerts Status

Background/Scenario Azure Alerts can be used to proactively notify you when important conditions are found in your monitoring data. After setting up either metric alerts or log alerts for your workloads, specifically IaaS workloads, there may be times when you ... continue reading