Monday, February 27, 2023

Making the World a Safer Place with Microsoft Defender for Individuals

As digital footprints grow, protecting personal data and devices becomes more important than ever. This is especially valid as employee households build up collections of disparate devices — which often includes Windows, iOS, Android and macOS systems all under one roof. With the latest security service for Microsoft 365 Personal Family subscribers, you can more easily defend personal accounts and small business data. Read the blog to learn how.


How can your organization benefit from an @Azure Virtual Desktop solution? Reply to discuss your goals and questions with one of our @Microsoft Cloud experts.

How can your organization benefit from an @Azure Virtual Desktop solution? Reply to discuss your goals and questions with one of our @Microsoft Cloud experts.

DGS Law Raises the Security Bar and Levels the Playing Field with Microsoft Defender Experts

DGS Law, a small law firm, needed a big-company-sized security solution to protect intellectual property and client assets. It chose Microsoft Defender Experts for XDR, a managed detection and response service offering Microsoft's security expertise and tools. Watch the video to learn from DGS Law's experience choosing, deploying and driving results with Microsoft Defender Experts.

Fiserv uses Microsoft Azure to simplify payment operations and reduce costs for its financial institution clients

When Fiserv sought to help its financial institution clients modernize and transform payment processing infrastructure, the global financial services company extended its Enterprise Payments Platform to the cloud on Microsoft Azure. Get the story to learn from Fiserv's experience using Microsoft Azure to deliver real-time payment processing, simplify payment operations and reduce costs.


Monday, February 20, 2023

End user passwordless utopia

With all the different technologies available in Azure and Azure Active Directory (Azure AD), it's easy to miss the bigger picture and how they all play into the end-user experience. Some promote convenience; others, security. All lessen the authentication burden on users and increase security posture. Read this technical blog for a walkthrough.


Defender Experts for Hunting

Microsoft Defender Experts for Hunting is a managed threat hunting service that provides security operation centers (SOCs) with expert-level monitoring and analysis. This video unpacks how Microsoft Defender Experts for Hunting works by walking through a real-world example of a pervasive phishing campaign. Watch the video:

Land O'Lakes, Inc. Shares the Recipe for Multicloud Protection: Microsoft Defender for Containers, Related Solutions

Land O'Lakes Inc has nearly ten thousand endpoint devices, and multiple cloud platforms and applications, all of which need security from viruses and cyber-attackers. When the company was seeking enterprise-wide security to protect its many on-site, cloud and mobile devices and applications, it turned to Microsoft Security. Land O'Lakes shares its experience with Microsoft Security in this customer story. Get the story for lessons learned about staying secure and productive.


Microsoft named a Leader in 2022 Gartner Magic Quadrant

Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra, earned Microsoft a Leader rank for the 6th year in a row in the 2022 Gartner® Magic Quadrant™ for Access Management. The recognition is testament to Microsoft's focus on delivering innovative solutions that enable customers to do more with less.


Monday, February 13, 2023

Free Virtual Desktop Consultation

Try before you buy is always good advice. That's why you should take advantage of a free consultation with one of our experts on Azure Virtual Desktop and how it can help you create a secure, flexible and adaptive hybrid cloud environment. Sign up for the Free Azure Virtual Desktop consultation today.

View: Free Virtual Desktop Consultation

Advancing Integrations with Threat Intelligence

Microsoft's Detection and Response Team (DART) is often in the trenches with customers trying to identify and squash cyber-attacks. DART depends on the power of threat intelligence, sophisticated analysis and dedicated team members to solve security problems and prevent damage. In this video, you'll learn how DART receives and responds to a typical ransomware attack at a manufacturing company. Watch the video.

Free Cyber Threat Hunting Bootcamp Consultation

Do you have a back door or other threats planted in your IT systems? With our personalized training services, Fidelitech Solutions Inc. can help you find, assess and remove threats from your organization. Schedule your free Cyber Threat Hunting Bootcamp Consultation with one of our threat hunting experts, today.

View: Free Cyber Threat Hunting Bootcamp Consultation

Hospitals reduce device management time by 60 percent, enable remote work in less than four weeks

Ashford and St. Peter's Hospitals National Health Service (NHS) Foundation Trust provides acute hospital services in Surrey, England. When the NHS provider had to quickly enable hundreds of employees to work from home, it moved to Azure Virtual Desktop. Get the story on how by saving the provider the cost and delay of procuring computers remote workers, Azure Virtual Desktop respond effectively and efficiently to changing needs.


Monday, February 6, 2023

The Forrester Wave:™ Extended Detection and Response (XDR) Providers, Q4 2021

XDR (extended detection and response) security is an emerging type of security that automatically identifies security threats across an enterprise. Unlike single-purpose security tools like email protection and firewalls, XDR protects cloud, endpoints, networks and other IT layers. In this report, Forrester Research evaluates 14 leading XDR solutions. Read the Forrester report to help inform decisions about XDR at our organization.


Azure AD Certificate-Based Authentication Now Available on Mobile

With Azure AD Certificate-based authentication (CBA) on mobile devices, you can now rely on digital certificates to validate users and devices before granting access to a network or application. This makes it harder for threat actors to gain unauthorized access to sensitive data. Read this blog for an overview of capabilities, benefits and how to set up Azure AD CBA on mobile devices.


Cooking with Azure Virtual Desktop -- Virtualization Review

A hidden gem, Azure Virtual Desktop addresses several end user computing problems. This article explains the basics. Read "Cooking with Azure Virtual Desktop" to learn what it is, where it fits, why you should care and improvements to expect.


Microsoft Defender for Office 365 Receives Highest Award in SE Labs Enterprise Email Security Services Test

Cyber-criminals have sophisticated tools and tactics for breaking into enterprise systems. Yet email is still a top attack vector. Why? Because humans can be easily tricked into giving out confidential information. While malware attachments are still common threats, attackers also use tactics such as impersonating top executives, launching multi-step attacks using trusted utilities, and phishing campaigns to con employees into providing login credentials or other sensitive data. This blog article discusses email attacks and explains the security capabilities of Microsoft's Defender for Office 365, which received an AAA Protection Award.