Select Page

Healthy security habits to fight credential breaches: Cyberattack Series

Fifty percent of Microsoft cybersecurity recovery engagements relate to ransomware,1 and 61 percent of all breaches involve credentials.2 In this second report in our ongoing Cyberattack Series, we look at the steps taken to discover, understand, and respond to a ... continue reading
Architecture diagram depicting the components and features of Azure API Management Gateway.

Manage your APIs with Azure API Management’s self-hosted gateway v2

Our industry has seen an evolution in how we run software. Traditionally, platforms were running in on-premises datacenters but started to transition to the cloud. However, not all workloads can move or customers want to have resiliency across clouds and ... continue reading
A triangle with various shades of light blue on the right side, the event title and date over a dark grey background on the left.

5 reasons to join us at Securely Migrate and Optimize with Azure

Did you know you can lower operating costs by 40 percent1 when you migrate Windows Server and SQL Server to Azure versus on-premises? Furthermore, you can improve IT efficiency and operating costs by 53 percent by automating management of your ... continue reading
Entra Identity Governance with Entra Verified ID – Higher Fidelity Access Rights + Faster Onboarding

Entra Identity Governance with Entra Verified ID – Higher Fidelity Access Rights + Faster Onboarding

 I’m excited to announce the integration of Entra Identity Governance Entitlement Management with a very cool technology we recently introduced, Microsoft Entra Verified ID!  If you think about what you need to onboard new users including employees, contractors, partners, or ... continue reading
The Net Zero journey: Why digital twins are a powerful ally

The Net Zero journey: Why digital twins are a powerful ally

Azure Digital Twins leverages IoT for powerful modeling that can ease transition to greater sustainability. Climate impacts raise stakes for Net Zero transition Following weeks of vital discussions at COP27 in Egypt, the urgency to bring the world to a ... continue reading
msfoxworks_1-1679043424671.png

Change Configuration Manager Site Server OS – High Availability Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading
Diagram showing the order of evaluation for network traffic with security admin rules and network security group rules.

Connect, secure, and simplify your network resources with Azure Virtual Network Manager

Enterprise-scale management and configuration of your network resources in Azure are key to keeping costs down, reducing operational overhead, and properly connecting and securing your network presence in the cloud. We are happy to announce Azure Virtual Network Manager (AVNM), your ... continue reading
:smile:

Change Configuration Manager Site Server OS – Disaster Recovery Reference

Hello!   My name is Herbert Fuchs and together with other members of the Customer Success Unit and the Customer Service & Support Organization we want to help our Customers with This Blog-Series. We gathered information and put our field ... continue reading

Gain flexibility and scale with a cloud-native DLP solution

We’re living in a seismic era for data security. Chief information security officers (CISOs) have to contend with a digital landscape that seems to shift daily as more organizations move to remote and hybrid work, redrawing the boundaries for how ... continue reading
Azure firewall Basic serves as the hub and connects to spoke 1 and spoke 2. It includes the L3-L7 connectivity policies, Microsoft threat intelligence feature, NAT, network and application traffic filtering that allows outbound and inbound connections. Without a rule, the traffic is denied by default.

Protect against cyberattacks with the new Azure Firewall Basic

Cyberattacks continue to rise across businesses of all sizes as attackers are adapting their techniques and increasing the complexity of their operations.1 The risk of these attacks is significant for small and medium businesses (SMBs) as they usually don’t have ... continue reading