Mobile Device Management Then and Now
In this article, I will take you down the memory lane of Microsoft Mobile Device Management (MDM) solutions.
In this article, I will take you down the memory lane of Microsoft Mobile Device Management (MDM) solutions.
In this article I will dive further into the Exchange Online security and compliance aspects on the physical, logical and data layers.
You’ve probably heard time and again that more than 63% of network intrusions are due to compromised user credentials. Once on the network, the adversary remains undetected for f months. You’ve spent years building up your perimeter and have a comprehensive protection strategy in place. That said, attackers are still coming through and/or you are worried about insider threats as well.
At Ignite, we showcased the integration between Cloud App Security and Azure Information Protection in the Cloud App Security session and Azure Information Protection session. Today, we’re excited to share more about this integration and demonstrate how it helps in extending security for your data as it travels to the cloud.
Below you find new and updated help topics published in October by the Information Protection content publishing team.
In this article, I will provide you with best practice recommendations from the field revolving around load balancing Exchange Server 2016 Client Access services.
In this article, I will provide you with information about “out of the box” Exchange Online security, compliance and privacy. In addition, I will talk about what you can do to further improve security and compliance for your Exchange Online users and data.
In this article, I will provide you with crucial Exchange 2016 upgrade information based on large enterprise organization engagements I have been involved in as an architect since the release of Exchange Server 2016 RTM.
Today, we’ve taken a significant step forward to empower businesses to achieve more with the first complete cloud offering delivered from a global provider within the U.K. Built to power their digital transformation, Microsoft Azure and Office 365 are now generally available from new datacenter regions.
In this article I'll talk about best practice recommendations and considerations when it comes to ambiguous namespace, Kerberos authentication for MAPI client and Outlook Anywhere URLs.