In this article I will dive further into the Exchange Online security and compliance aspects on the physical, logical and data layers.
You’ve probably heard time and again that more than 63% of network intrusions are due to compromised user credentials. Once on the network, the adversary remains undetected for f months. […]
At Ignite, we showcased the integration between Cloud App Security and Azure Information Protection in the Cloud App Security session and Azure Information Protection session. Today, we’re excited to share […]
Below you find new and updated help topics published in October by the Information Protection content publishing team.
In this article, I will provide you with information about “out of the box” Exchange Online security, compliance and privacy. In addition, I will talk about what you can do […]
In this article, I will provide you with crucial Exchange 2016 upgrade information based on large enterprise organization engagements I have been involved in as an architect since the release […]
Today, we’ve taken a significant step forward to empower businesses to achieve more with the first complete cloud offering delivered from a global provider within the U.K. Built to power […]
In this article I'll talk about best practice recommendations and considerations when it comes to ambiguous namespace, Kerberos authentication for MAPI client and Outlook Anywhere URLs.
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!