Cybersecurity Blog

3 min read

The Office 365 for Government Buyers Journey

By Brandon Lecoq on Oct 24, 2019 4:45:26 PM

Most of our customers and partners ask us about the approval process for government organizations wanting to be on Microsoft Government Community Cloud (GCC). It's hard to find any reading materials online and even when you call Microsoft's sales number the reps aren't equipped with the knowledge either, so I'm writing this to clear the air!

Continue Reading
23 min read

Azure AD Identity Protection: 17 Best Practices

By Bruno Lecoq on Oct 22, 2019 12:29:29 PM

A successful Zero Trust strategy requires seamless and flexible access to applications, systems, and data while maintaining security for both users and the resources they need to do their jobs. It requires being cloud-ready, starting with identity, and then taking steps that will help secure all areas of your environment. Here's what you need to implement for Azure AD Identity Protection:

Continue Reading
13 min read

Windows Autopilot Overview

By Catalin Alaci on Oct 21, 2019 10:35:07 AM

When you bring on a new hire does your IT team spend time having to configure that person's computer and then does the new hire has to spend the next 7 days setting up their accounts and apps? Isn't this boarding process frustrating? Welcome to Windows Autopilot.

Continue Reading
11 min read

Microsoft EMS E3 vs E5

By Joel Lachance on Oct 11, 2019 7:00:55 AM

In our last blog post, What is Microsoft EMS? we gave an overview of the 6 tools that make the Enterprise Mobility + Security suite. In this post we'll dive into the 13 specific differences between the EMS E3 and E5 licenses, so that you can decide which version you need.

Continue Reading
8 min read

What is Microsoft EMS?

By Joel Lachance on Oct 10, 2019 9:16:07 AM

Microsoft launched the Enterprise Mobility + Security (EMS) in March 2014, in an effort to transition from 'bolted-on' security to 'built-in' security. It was a huge bet at the time, as EMS was meant to bring enterprise-level security that Fortune 500 companies were using to small and medium businesses (SMBs).

Continue Reading