8 Steps for a Successful Teams Rollout

Posted by aeadmin on Jun 13, 2018 7:09:28 AM

 

In our last post we described the core features and capabilities of Microsoft Teams. The application serves as a hub for applications, document sharing and meetings, with a persistent threaded chat feature that keeps teams engaged and informed. Microsoft Teams can easily be customized to meet diverse needs and has advanced security features to protect sensitive data.

Read More

Tags: Technology, Microsoft, Teams

Microsoft Team Promises to Enhance Workplace Collaboration

Posted by aeadmin on Jun 6, 2018 1:13:00 PM

 

Almost 40 percent of employees will work remotely within 10 years, according to a recent survey by Upwork. Eighty-six percent of respondents said that escaping the confines of the office increases productivity by eliminating distractions and impromptu meetings.

Read More

Tags: Technology, Microsoft

Better Understanding of the SCCM SUP Process

Posted by aeadmin on Mar 16, 2018 10:52:06 AM

 

In a recent alert, the U.S. Computer Emergency Readiness Team (US-CERT) said that about 85 percent of successful security breaches involve systems that have not been patched. A recent study by research firm Voke Media found that 82 percent of security breaches since 2015 occurred due to unapplied patches that had been available for up to a year.

Read More

Tags: adaptivedge, SCCM, software update, Microsoft, SUP

Tools and Techniques for Protecting Privileged Accounts

Posted by aeadmin on Dec 28, 2017 1:35:06 PM


In our last post, we explained that identity has become the new perimeter in today’s cloud-based, mobile-enabled environment. It’s no longer possible to maintain IT assets and applications behind a firewall. Organizations must implement robust identity management and authentication mechanisms to ensure that only authorized users gain access to resources.

Read More

Tags: Active Directory, adaptivedge, Azure, cybersecurity, privileged accounts, Microsoft

How Azure Active Directory Premium Helps Secure the Identity Perimeter

Posted by aeadmin on Dec 15, 2017 10:00:00 AM

 

The days when users accessed corporate applications and data via desktops at the office are long past. Mobile devices enable anytime, anywhere access to both internal and cloud-based resources. The traditional network perimeter no longer exists.

Read More

Tags: Active Directory, adaptivedge, microsoft azure, cybersecurity, Microsoft, security