Blog
Priyam Ghosh
-
Jun 25, 2025
Introduction In the modern era, endpoint security has become crucial to businesses. Organizations require protection for their assets as cyberattacks continue to spread rapidly and become sophisticated in…
Blog
Subhankar Bhattacharjee
-
Sep 11, 2024
Introduction USB drives, while convenient, pose a significant security risk, as they can easily introduce malware or facilitate data exfiltration. For organizations using Microsoft Intune and Microsoft Defender,…
Blog
Subhankar Bhattacharjee
-
Aug 16, 2024
Introduction The modern mobile-centric business landscape implies that safeguarding sensitive corporate data is a top priority. Employees have access to more devices to access company resources than before.…
Blog
Sumit Kumar Mahajan
-
Apr 12, 2024
Introduction In the intricate process of migrating to Microsoft Intune, a successful communication and support strategy, coupled with a robust implementation plan, is crucial for facilitating user adoption.…
Blog
Steve Andrews
-
Jun 24, 2022
Introduction: In Part 1 of this blog series, we explained in detail what Endpoint Detection & Response (EDR) is and the importance of the powerful Defender for Endpoint…
Blog
Steve Andrews
-
Apr 19, 2022
Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New NameOld NameMicrosoft 365 DefenderMicrosoft Threat ProtectionDefender for EndpointMicrosoft Defender…
Blog
Steve Andrews
-
Jan 11, 2022
Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader in Unified Endpoint Management…