Using Microsoft Graph Explorer - firstly, what is it? It's a tool that helps you interact with Graph APIs such as Intune, but also provides a base for learning to develop apps and scripts...
Find out how to set up a Microsoft Graph connection with Azure in part two of our three part blog series...
What is Microsoft Graph, and how do you use it? Find out in this three-part blog series.
Corporate data is now accessible on the move more than ever, so it is key for businesses to able to protect the user data of applications on devices outside of traditional IT management control...
With the sudden rise in demand to allow users to work from home, having at least the minimum level of management over devices is a must for businesses to support protection of company data and support users outside of the…
Deliver a clean, secure and robust remote working experience within days to allow employees to work from home.
One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on…
One of the major tradeoffs between solutions and the setup time and complexity is the ability to synchronise account permissions and identities between the originating Azure AD tenant and the solution identity. Each solution will handle this differently depending on…
We’ve worked with a number of customers to enhance their modern authentication strategy – this is often done to increase supplier flexibility as well as start to remove dependencies on existing VPN and Active Directory dependencies. It can also improve…
Enabling IaaS Encryption-What Encryption and Common Limitations Look Like (Part 3) This is the final blog in a 3-part series detailing my investigations on the current state of enabling Infrastructure as a Service (IaaS) Encryption functionality. Details are accurate as…