Select Page
A line chart showing the number of D D o S attacks from July 2021 to January 2022.

Azure DDoS Protection—2021 Q3 and Q4 DDoS attack trends

This blog post was co-authored by Anupam Vij, Principal PM Manager, and Syed Pasha, Principal Network Engineer, Azure Networking In the second half of 2021, the world experienced an unprecedented level of Distributed Denial-of-Service (DDoS) activity in both complexity and ... continue reading
Bastion 101 - Connections with Confidence

Bastion 101 – Connections with Confidence

Lately, I have been spending a lot of time working with Azure Virtual Machines (VMs) debugging some ways to deploy applications. Sometimes when troubleshooting a problem, it helps to have administrative access directly to the server. Finding solutions to avoid ... continue reading
Three icons representing data at rest, in transit, and in use.

Adopting a Zero Trust approach throughout the lifecycle of data

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero ... continue reading
Video 2 of the Azure VMware Solution Zero to Hero Series!

Video 2 of the Azure VMware Solution Zero to Hero Series!

Continuing with our Azure VMware Solution (AVS) zero to hero video series, this week the next video releases! In this video, Shabaz Darr (@ShabazDarr) and I cover the high level overview for Azure VMware Solution, taking you from zero closer ... continue reading
Azure Migrate portal displaying discovery and assessment of servers

Discover and assess ASP.NET apps at-scale with Azure Migrate

Azure Migrate is your central place in the Azure portal that provides a unified experience to discover, assess, and migrate your servers, databases, and web apps to Azure. With a range of options across IaaS, PaaS, CaaS, and Serverless, Azure ... continue reading

7 ways to harden your environment against compromise

Here at the global Microsoft Compromise Recovery Security Practice (CRSP), we work with customers who have experienced disruptive security incidents to restore trust in identity systems and remove adversary control. During 2020, the team responded to many incidents involving ransomware ... continue reading
Modernization capabilities of Azure Migrate: App Containerization

Accelerate application modernization with Azure Migrate: App Containerization

As organizations embark on cloud-centric business transformation to become more agile and operationally efficient, application modernization is fast becoming a cornerstone to realize these goals. In this blog, we will see how the Azure Migrate: App Containerization tool helps you ... continue reading
Azure Arc for Developers

Azure Arc for Developers

Azure Arc and the Azure control plane enables developers to build hybrid and mutlicloud architectures for their applications. Taking advantage of the Azure control plane to manage infrastructure and allows to deploy Azure services anywhere. This allows customers to build ... continue reading

Know your options for SQL Server 2012 and Windows Server 2012 End of Support

Customers trust Windows Server and SQL Server for their business-critical workloads. With SQL Server 2022, customers like Ita Unibanco are taking advantage of the built-in intelligence, industry-leading performance, and security across both structured and unstructured data. Similarly, customers like CadDo ... continue reading
Azure Bastion Architecture Overview.

Manage RDP and SSH connectivity at scale with Azure Bastion

Securely manage remote connectivity at scale Security is at the forefront of user and administrator connectivity to cloud services. As enterprises continue to move mission-critical applications to the cloud, the need for secure, scalable, and reliable remote public connectivity and ... continue reading