Select Page
An image of the management of the lifecycle of a discovered app.

Microsoft Zero Trust deployment guide for your applications

Introduction More likely than not, your organization is in the middle of a digital transformation characterized by increased adoption of cloud apps and increased demand for mobility. In the age of remote work, users expect to be able to connect to any resource, on any device, from ... continue reading

How to optimize your Azure workload costs

The economic challenges posed by the global health pandemic continue to affect every organization around the world. During this difficult time, cost optimization has become an especially critical topic. Recently, we provided an overview of how to approach cost optimization ... continue reading

Benchmarking SQL Server and Azure SQL with WorkloadTools | Data Exposed: MVP Edition

Lifting and shifting your application to the cloud is extremely easy, on paper. The hard truth is that the only way to know for sure how it is going to perform is to test it. Benchmarking on-premises is hard enough, ... continue reading

Premier Offerings: WorkshopPLUS Azure Security Best Practices

G ‘day, I am Vic Perdana, Sr. PFE based in Melbourne, Australia. As COVID-19 forces people to work from home, the number of bad actors is ramping up as demonstrated by the increase of cyber-attacks globally, it is becoming *very* ... continue reading
Diagram of a high-level view of the global Azure.com architecture.

How Azure.com operates on Azure part 2: Technology and architecture

When you’re the company that builds the cloud platforms used by millions of people, your own cloud content needs be served up fast. Azure.com—a complex, cloud-based application that serves millions of people every day—is built entirely from Azure components and ... continue reading

Modernizing the security operations center to better secure a remote workforce

The response to COVID-19 has required many security operations centers (SOCs) to rethink how they protect their organizations. With so many employees working remotely, IT groups are routing more traffic directly to cloud apps, rather than through the network. In ... continue reading
Maturity model.

Zero Trust—Part 1: Networking

Enterprises used to be able to secure their corporate perimeters with traditional network controls and feel confident that they were keeping hackers out. However, in a mobile- and cloud-first world, in which the rate and the sophistication level of security ... continue reading

Be prepared for what’s next: Accelerate cloud migration

We are in the midst of unprecedented times with far-reaching implications of the global health crisis to healthcare, public policy, and the economy. Organizations are fundamentally changing how they run their businesses, ensure the safety of their workforce, and keep ... continue reading
KB cluster2

Detect large-scale cryptocurrency mining attack against Kubernetes clusters

Azure Security Center's threat protection enables you to detect and prevent threats across a wide variety of services from Infrastructure as a Service (IaaS) layer to Platform as a Service (PaaS) resources in Azure, such as IoT, App Service, and ... continue reading

Zero Downtime Deployments with Azure PaaS

How can I deploy my applications to Azure Platform-as-a-Service (PaaS) like Azure Kubernetes Service (AKS) without having any downtime? How can I automate this, and how can I ensure my customers won't notice changes are happening? In this interview, you ... continue reading