Browse by Tags

Tagged Content List
  • Blog Post: Wrapping Up 2014 - Enterprise Mobility Year in Review

    As this year comes to a close, we’ve been reflecting on how far we’ve come since introducing the Enterprise Mobility Suite in March. Let’s take a look back at the most important enterprise mobility news of 2014. Product Announcements We are constantly delivering updates and...
  • Blog Post: Improve Security with Identity Management - Password Hashing and Reports

    Enhancing security has always been a crucial part of Azure Active Directory, the cloud-based Identity and Access Management service of Microsoft and a component of the Enterprise Mobility Suite . The main message of the service, never was just to provide Single Sign On to all kinds of Public Cloud SaaS...
  • Blog Post: Microsoft at Gartner Identity & Access Management Summit

    December 2-4, 2014 Microsoft will be participating in the Gartner Identity & Access Management Summit in Las Vegas, NV as a Platinum sponsor. Building on our recent momentum around Identity-as-a-Service and on-premises Identity & Access Management, Microsoft will be featuring our solutions at...
  • Blog Post: How Strong Identity Management Solutions Can Benefit Your Business

    With IT departments enabling users to work anywhere on any device, identity management becomes a very critical component of an organization’s enterprise mobility strategy. It is important to allow your users access to the data they need, but to be able to manage and monitor that access. A user’s...
  • Blog Post: Managing and monitoring desktop virtualization

    Now we’ve come to my fourth and final blog post. If you missed the first three parts, I invite you to check them out today desktop virtualization deployment overview , deploying desktop virtualization , and accessing desktop virtualization . In this post, I want to talk about the products, services...
  • Blog Post: Accessing desktop virtualization

    This is my third blog post in my series about desktop virtualization using Windows Server 2012 R2 and Microsoft Azure . In my previous blog post, I covered deploying your desktop virtualization infrastructure on premises or in Microsoft Azure. Now, how do you access the virtualized desktops? I'm...
  • Blog Post: Desktop virtualization deployment overview

    Today we are launching a four-part blog series on desktop virtualization. Desktop virtualization is an essential IT service for most organizations, regardless of their size. There are a number of reasons for deploying desktop virtualization, such as the ability to run Windows apps on a variety of devices...
  • Blog Post: Preparing for Mobile Device Management

    Over the next few days, I’ll be writing a series of blog posts about mobile device management (MDM). Microsoft’s focus is on providing best-in-class mobile and cloud services. Today, everyone has a mobile device, whether it’s a tablet, convertible, laptop, or smartphone. Users are...
  • Blog Post: How The Walsh Group gained agility and scalability by moving to public cloud

    The Walsh Group is responsible for some of the largest construction projects in the world, including air traffic control towers, highways, bridges, stadiums, casinos, wastewater treatment plants, rapid transit systems, universities, and correctional facilities. Although Walsh depends on modern IT...
  • Blog Post: Identity and Access Management for the Cloud

    Our last blog post on On-boarding to the Cloud discussed extending your on-premises directory into the cloud with Microsoft Azure Active Directory (Azure AD). Today we’ll talk about some of the additional benefits you and your users can benefit from by using Azure AD, along with Azure AD Premium...
  • Blog Post: On-boarding to the Cloud

    In our last blog post on Consistent Identity in the Data Center , we discussed having a consistent directory service within your own infrastructure. Today, we’ll discuss how to extend that directory into the cloud. When you look at managing identity in the cloud, you need to make some initial...
  • Blog Post: Consistent Identity in the Data Center

    Welcome to this series of blog posts about Hybrid Identity ! Over the next few days, we want to talk about Hybrid Identity and, in particular, Microsoft Azure Active Directory . Hybrid Identity is part of the realm of Identity and Access Protection, which refers to the technologies, features, and...