Select Page

Microsoft Entra change announcements – September 2022 train

Hello everyone,  In March 2022, we announced our simplified change management process, which allows customers to predictably plan their deployments, and in June, we introduced Microsoft Entra as our new product family that encompasses all of Microsoft’s identity and access ... continue reading
DarrenTurchiarelli_5-1661811658809.png

Domain Join a Storage Account Leveraging Azure Automation

Are you looking to take the next step in your cloud journey and pivot away from managing file servers? Why not look at Azure Files! In short; Azure Files offers fully managed file shares in the cloud that are accessible ... continue reading
Azure Virtual Machines Automation - Deployment

Azure Virtual Machines Automation – Deployment

Welcome to this series where you will learn the various best practices for deploying Azure Virtual Machines and how to manage them at scale. To get started, we are going to take a look at various deployment options; how you ... continue reading

Detecting malicious key extractions by compromised identities for Azure Cosmos DB

Azure Cosmos DB is a fully managed NoSQL cloud database service for modern app development. It offers a variety of advanced built-in features, such as automatic worldwide data replication, lightning-fast response types, and a variety of APIs. In this blog ... continue reading
Logs with time stamps showing start and completion of the core network deployment.

Azure powers rapid deployment of private 4G and 5G networks

As the cloud continues to expand into a ubiquitous and highly distributed fabric, a new breed of application is emerging: Modern Connected Applications. We define these new offerings as network-intelligent applications at the edge, powered by 5G, and enabled by ... continue reading
hspinto_0-1654852954197.png

Azure DDoS Protection Standard Costs Estimation

If you are considering the activation of Azure DDoS Protection Standard – a great solution to better protect your Azure Virtual Network (VNet) resources from DDoS attacks – you may ask yourself: Which VNet(s) should you enable the service in? ... continue reading
Illustration of the Custom IP Prefix onboarding process.

Bring your own IP addresses (BYOIP) to Azure with Custom IP Prefix

When planning a potential migration of on-premises infrastructure to Azure, you may want to retain your existing public IP addresses due to your customers' dependencies (for example, firewalls or other IP hardcoding) or to preserve an established IP reputation. Today, ... continue reading
Microsoft Defender for Cloud Dashboard featuring security posture chart, Firewall manage, regulatory compliance status, and workload protections.

3 steps to secure your multicloud and hybrid infrastructure with Azure Arc

As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent. Today, organizations face an attacker ecosystem that is highly economically ... continue reading
AlanLaPietra_0-1648554341870.png

Microsoft Defender Ecosystem

DEFENDER FOR CLOUD Microsoft Defender for Cloud - an introduction | Microsoft Docs Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft ... continue reading
Bicep vs ARM Templates

Infrastructure as Code (IaC): Comparing the Tools

When you go to deploy a server or any part of our infrastructure manually, how long does it take you? Can you do a manual deployment end to end without any mistakes? Now, how do you scale that? This is ... continue reading