Microsoft Azure SQL Database is very similar to on-premises SQL Server, but there are a few key differences. One of these difference is that SQL Azure doesn’t support integrated authentication (i.e. when caller is identified by its domain account). I assume this is a technical limitation which could be explained by the lack of domain […]
Posts Tagged ‘security’
New features for Office 365 SSO and RMS – Ignite 2015
Some very exciting new capabilities were announced here (Ignite conference) as part of the Office 365 suite powered by Azure AD and rights management service. I will share two of these here • Cloud App Discovery • Document Tracking Cloud App Discovery With 365 you’re already setup for SSO but if you require some advanced […]
Threat Resistance in Windows 10 – Ignite 2015
Enterprise and Personal Security Model revolves around: Identity protection Info protection Threat resistance Windows 10 addresses the threat resistance in the following three ways: 1. Windows Hello (will use fingerprints, facial recognition and biometrics.) Unlocks your device with biometrics and gives access to your MS passport 2. EDP (Enterprise data protection) Enrollments –> Data Ingress (everything […]
Next-Gen Information Protection Announcements – Ignite 2015
The following are my notes from the Next-Gen Information Protection announcements at Microsoft Ignite 2015. Microsoft thinks about security in three ways: Being pervasive Transparent People-centric Pervasive – policy applied to data level (when its created inside the ecosystem) so it goes with data across devices. Unified compliance – running data through compliance center across email, […]
My Top 7 Google Security Tips for Users and Admins
I. Create Safe and Secure Passwords – By far the easiest way to access your mail account for nefarious activity is by using a stolen password. Google Apps User Make sure you create safe and unique passwords for all your important accounts Make sure you store your passwords in a secure way Try using a password generator […]
BUILD & IGNITE Know It. Prove It. Tech Challenge Tour
I recently blogged about my personal experiences with the first “Know it. Prove it.” challenge that ran through the month of February 2015. The “Know it. Prove it.” challenge is back! This time it’s bigger and better than ever. The new challenge is a companion to both the Build and Ignite Conferences with 11 amazing […]
Creating Microsoft FIM Management Agent: lessons learned
Microsoft FIM (Frontend Identity Manager) is a popular enterprise product which is allowing to automate user creation, provisioning and de-provisioning in Microsoft Active Directory. FIM has many out-of-the-box extension connectors which allows for connecting FIM to external systems (like external user catalogs), including a set of web services. When out-of-the-box connectors are not sufficient, it’s […]
IBM Aims High at Investor Day Meeting
Last week, during IBM’s Investor Day, CEO Ginni Rometty announced that IBM’s investment strategy would mirror and support its evolving go-to-market strategy, by funneling $4 billion into cloud, analytics/big data, mobile, social and security (CAMSS). Through this investment, IBM is looking to expand the footprint of its CAMSS offerings from $25 billion in revenue to […]
New Additions to the Office 365 Family
I’ll keep this post short and sweet in honor of Friday! Now if you are an avid follower of Microsoft, you got to agree that the most fascinating news (other than stock news) about the company is their shift to the cloud with platforms and products like Azure and Office 365. With so much exciting […]
Microsoft Azure ExpressRoute is free through June 30, 2015
The most common way for enterprises to connect their datacenters or home offices to resources in Microsoft Azure is over VPN. Although Microsoft has made connecting to Azure quick and easy, VPNs, in general, do have their drawbacks. Because they traverse the public internet, availability and performance are difficult to control. Latency can also be […]
SharePoint Online eDiscovery Center For All Your Legal Needs
Ever have requests to furnish old emails, messages, documents to your HR or legal teams? In this digital era, we experience an overflow of electronic information in forms of email, documents, IM conversations, etc. It can be chaotic when you are expected to look for content from several years in the past. Have you ever […]
How Secure is Your Cloud? – Introduction to Office 365 Security
Who owns the data we store in your service? Will you use our data to build advertising products? Do you offer privacy controls in your service? Do we have visibility to know where our data is stored? Can we get our data out of your service if we decide to leave? These questions are top […]