[RESOURCES]

Explore the latest practical advice to boost your organization’s security

[Must Read]

SECURING ON-PREMISES ACCESS IS EASIER THAN YOU THINK: UTILIZING THE AZURE AD APPLICATION PROXY

In a previous blog post, we discussed taking advantage of Azure Active Directory (AD) Application Proxies to allow access to on-premises applications without a dependency on traditional tools such as a VPN. That blog includes a few great points that should be highlighted again. READ MORE

Join our mailing list
Sign up to our newsletter to get our latest resources delivered to your inbox.
Join our mailing list
Sign up for our newsletter to get our latest resources delivered to your inbox.

[EXPLORE RESOURCES]

[FROM THE BLOG]

Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this [...]
One important function of Certificate Authorities that’s mentioned briefly in Part 2 of our “Components of a PKI” blog series is the ability to perform certificate revocation, or the CA’s [...]
In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA [...]
User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system [...]
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will [...]
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data [...]
In large-scale Microsoft Intune deployments, you’ll typically find both production and development tenants. For effective application testing, you’ll need to assign your applications to test groups of devices or users. [...]
In Part 3 of this blog series, we discuss some other important considerations when taking this approach to automation. [...]