Cloud Data Sharing

Sharing is caring, Azure Data Share

E-Mail or FTP is still a preferred tool to share information, but services like Dropbox, Google Drive, OneDrive and the likes have also become very popular. But what if there would be an enterprise-ready tool which simplifies data-sharing and provides full control? Then Azure Data Share would be your best friend.

Identity Security Hacker Password Username

What’s next – topics to think about in Identity

Why not read something technical you enjoy and spend some time during the holidays? This article shares a number of topics around identity which seems to perfect to reflect on and could help you to prepare a cloud identity roadmap for 2019. Florian put together his thoughts on the major things that will be of importance in the next year or two, from a Microsoft Identity perspective.

passwordless password secure

Eradicating passwords – first steps of a year-long journey

Microsoft has embarked on a journey to eradicating passwords in enterprises. To protect corporate assets users must change their way of working. Will we give up on passwords moving forward? This article is talking about the recent announcement from Microsoft and how this affects the enterprise customers.

Azure Firewall Service Endpoints Security

Secure your Assets, secure your Endpoints

Data breaches remain a top concern for many customers and it still can be very hard to convince some security officers to move data to the cloud. Most of the customers want to limit access to their cloud resources to their networks only. This article describes how to achieve this goal.

Legacy Application Migration Azure

The hassle of touching a delicate application

This article is a real-life example of a dated application that must be touched so it can continue to run – and why lift & shift sometimes not works. Especially when it’s a internet-facing application and you’re still dealing with credentials yourselves. We share learnings we’ve had with our app, that can easily be transported to your “special” app.

Security Access App Service Edge

Sir, what if the perimeter died?

This article asks you to reset your thinking about your perimeter, the firewalls you built and the border between inside/outside: they no longer exist. Modern access patterns blur the lines between inside vs. outside and you need to manage your risk differently than building a wall and controlling what’s passing that wall.