Blog
Introduction: There are numerous reasons why organizations will want to migrate from one tenant to another or consolidate different tenants. Some instances when an organization considers tenant-to-tenant migration…
Sridhar Chalapathy
·
Aug 9, 2022
Blog
Introduction: In Part 1 of this blog series, we explained in detail what Endpoint Detection & Response (EDR) is and the importance of the powerful Defender for Endpoint…
Steve Andrews
·
Jun 24, 2022
Blog
Introduction: “If data is the new oil, Semiconductor is the new steel,” says James Andrew Lewis, Sr. Vice President & Director of Strategic Technologies Program at CSIS. It…
Niraj Tenany
·
Jun 17, 2022
Blog
Introduction: After a major security product re-brand and feature/functionality enhancements, the Defender Suite takes shape: Defender Branding Updates New NameOld NameMicrosoft 365 DefenderMicrosoft Threat ProtectionDefender for EndpointMicrosoft Defender…
Steve Andrews
·
Apr 19, 2022
Blog
Introduction: As enterprises embrace the opportunities presented by cloud and mobile computing to connect with customers and optimize operations, they take on new risks. One of the biggest…
Arghya Roy
·
Feb 10, 2022
Blog
Introduction: After a swift product shuffle and re-branding we find Microsoft Endpoint Manager emerging to rise up the Gartner ranks to become the leader in Unified Endpoint Management…
Steve Andrews
·
Jan 11, 2022
Blog
Introduction: The globe is littered with opportunists with sticky fingers – and it’s never been more prevalent than in today’s digital landscape. Whether it’s the one-off hacker who…
Niraj Tenany
·
Dec 28, 2021
Blog
Summary: As the COVID-19 pandemic has been dramatically altering typical business strategies, the coming decade will be marked by significant transformation worldwide. Data protection has already started playing…
Arghya Roy
·
Aug 4, 2021