Free Azure Key Vault Azure DevOps Pipeline Extension

Announcing the free PowerON Azure Key Vault Azure DevOps Pipeline Extension!
Using Microsoft Graph Explorer

Using Microsoft Graph Explorer – firstly, what is it? It’s a tool that helps you interact with Graph APIs such as Intune, but also provides a base for learning to develop apps and scripts…
Setting up a Microsoft Graph Connection

Find out how to set up a Microsoft Graph connection with Azure in part two of our three part blog series…
Microsoft Graph – What is it?

What is Microsoft Graph, and how do you use it? Find out in this three-part blog series.
Application Security Controls

Corporate data is now accessible on the move more than ever, so it is key for businesses to able to protect the user data of applications on devices outside of traditional IT management control…
Remote Management Tooling: Webinar + Q&A

With the sudden rise in demand to allow users to work from home, having at least the minimum level of management over devices is a must for businesses to support protection of company data and support users outside of the corporate network.
Webinar: Secure Remote Working On-Demand

Deliver a clean, secure and robust remote working experience within days to allow employees to work from home.
Mobile Device Custom Notifications in Microsoft Endpoint Manager

One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on the identity option selected in Part 1 of the series.
Planning for Modern Authentication – Part 2 – Account Synchronisation

One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on the identity option selected in Part 1 of the series.
Planning for Modern Authentication – Part 1: User Authentication

We’ve worked with a number of customers to enhance their modern authentication strategy – this is often done to increase supplier flexibility as well as start to remove dependencies on existing VPN and Active Directory dependencies. It can also improve the end user experience by minimising the number of accounts and passwords needed and can […]