Using Microsoft Graph Explorer

lightbulb filled with polygons

Using Microsoft Graph Explorer – firstly, what is it? It’s a tool that helps you interact with Graph APIs such as Intune, but also provides a base for learning to develop apps and scripts…

Application Security Controls

Blue dots

Corporate data is now accessible on the move more than ever, so it is key for businesses to able to protect the user data of applications on devices outside of traditional IT management control…

Remote Management Tooling: Webinar + Q&A

3D rendering of polygons

With the sudden rise in demand to allow users to work from home, having at least the minimum level of management over devices is a must for businesses to support protection of company data and support users outside of the corporate network.

Mobile Device Custom Notifications in Microsoft Endpoint Manager

skyscrapers overlaid with digital lines

One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on the identity option selected in Part 1 of the series.

Planning for Modern Authentication – Part 2 – Account Synchronisation

padlock and fingerprint cyber security

One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on the identity option selected in Part 1 of the series.

Planning for Modern Authentication – Part 1: User Authentication

3D rendering of polygons

We’ve worked with a number of customers to enhance their modern authentication strategy – this is often done to increase supplier flexibility as well as start to remove dependencies on existing VPN and Active Directory dependencies.  It can also improve the end user experience by minimising the number of accounts and passwords needed and can […]

Enabling IaaS Encryption – What Encryption & Common Limitations

digital highway of information

Enabling IaaS Encryption-What Encryption and Common Limitations Look Like (Part 3) This is the final blog in a 3-part series detailing my investigations on the current state of enabling Infrastructure as a Service (IaaS) Encryption functionality.  Details are accurate as of August 2018.   Throughout the series, I will explore the following articles: When to use […]