Tag: Tech Overview

Windows service accounts overview

When building and deploying applications on Microsoft Windows, one of the key considerations is how these applications authenticate and interact with the operating system and other network resources. This often involves the use of service accounts—specialized accounts under which applications, services, or scripts run. However, not all service accounts are...

Read More

Comparing Google and Microsoft productivity applications

When it comes to productivity suites, Microsoft 365 (M365) and Google Workspace are two of the most dominant players in the market. Both offer a range of applications designed to boost productivity, facilitate collaboration, and streamline workflows. In this blog, we’ll compare the core applications in each suite, focusing on...

Read More

Windows 365 versus Azure Virtual Desktop

In today’s remote work environment, businesses need robust virtual desktop solutions to provide secure and flexible access to applications and data. Two prominent options from Microsoft are Windows 365 and Azure Virtual Desktop (AVD). Both have their own strengths and are suited to different scenarios. This blog will dive into...

Read More

How do you choose your Cloud Provider

As organisations increasingly migrate their IT infrastructure to the cloud, one of the most critical decisions they face is choosing between leading cloud providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Additionally, there’s the question of whether to adopt a single-cloud approach or distribute workloads...

Read More

Microsoft 365 security or third party

As the digital landscape evolves, organisations face increasingly sophisticated threats that target various aspects of their infrastructure. Microsoft 365 (M365) offers a comprehensive suite of security products designed to protect identities, data, devices, and networks in both cloud and hybrid environments. While M365’s security tools provide robust protection, organisations may...

Read More

Legacy Outlook versus new Outlook

Microsoft Outlook has been a cornerstone of email communication and personal information management for decades. As technology advances, so do the tools we use. Microsoft has introduced a new iteration of Outlook, often referred to as “One Outlook” or “Project Monarch,” designed to modernise the user experience and unify the...

Read More

Microsoft 365 licensing quick start

When it comes to licensing Microsoft 365 (M365) and Office 365 (O365), understanding the various options and finding the best fit for your organisation can feel overwhelming. With a range of Business and Enterprise SKUs (Stock Keeping Units), along with a myriad of add-ons, businesses must weigh their needs against...

Read More

Google Workspace versus Microsoft 365

In today’s digital workspace, choosing the right productivity suite can significantly impact your organisation’s efficiency and collaboration. Google Workspace and Microsoft 365 are the leading solutions in this space, each offering a robust set of tools tailored to different needs. This blog will compare Google Workspace and Microsoft 365 across...

Read More

Lining up Teams, Slack and Google Chat

In the business world today, effective communication and collaboration are crucial. Three popular tools designed to facilitate these aspects are Microsoft Teams, Slack, and Google Workspace Chat. Each platform has its strengths and unique features, making them suitable for different organisational needs. Here’s a detailed comparison to help you choose...

Read More

Comparing Okta and Entra ID

In the landscape of identity and access management (IAM), two prominent players are Okta and Microsoft Entra ID (formerly Azure Active Directory). Each offers a suite of features designed to manage user identities, access, and security, but they cater to different needs and technological environments. This blog will provide an...

Read More

Overview of the Microsoft security stack

As the digital landscape evolves, organisations face increasingly sophisticated threats that target various aspects of their infrastructure. Microsoft 365 (M365) offers a comprehensive suite of security products designed to protect identities, data, devices, and networks in both cloud and hybrid environments. While M365’s security tools provide robust protection, organisations may...

Read More

Compare Microsoft Global Secure Access and ZScalar

In an increasingly digital world, securing access to corporate resources is more critical than ever. As organisations embrace remote work and cloud-based services, the need for robust security solutions to protect data and ensure seamless access has surged. Two prominent players in this domain are Global Secure Access (GSA) from...

Read More

What is Microsoft Global Secure Access

In today’s digital world, as organisations continue to embrace hybrid work models and cloud-based solutions, ensuring secure access to resources across a global workforce has become a critical challenge. Microsoft’s Global Secure Access (GSA) aims to address this by offering a comprehensive solution designed to protect users, devices, and data....

Read More

Active Directory migration overview

Migrating from one Active Directory (AD) environment to another is a complex and delicate task that requires careful planning and execution. This guide will walk you through the essential steps and considerations for a successful AD-to-AD migration, focusing on minimising user impact, maintaining security, and ensuring ongoing access to critical...

Read More

Strong authentication overview

In today’s cybersecurity landscape, robust authentication methods are crucial to protect sensitive information and ensure that only authorised users can access critical systems. Microsoft offers a range of strong authentication options tailored to meet diverse security needs, categorised into three key areas: multifactor authentication (MFA), passwordless authentication, and phishing-resistant authentication....

Read More

Entra ID Password protection overview

Introduction In today’s cybersecurity landscape, strong password policies are crucial for protecting against unauthorised access and cyberattacks. Entra ID Password Protection extends Azure Active Directory’s robust password security features to on-premises Active Directory environments. This integration helps organisations enforce consistent password policies across both cloud and on-premises systems. This blog...

Read More

MFA for all users and the user experience impact

When recommending that Multi-Factor Authentication (MFA) be configured for all users in Entra ID (formerly Azure Active Directory), one of the most common concerns you’ll encounter is, “How often will users be prompted to complete MFA?” This question often stems from a fear that MFA will disrupt daily workflows by...

Read More

Entra ID Continuous Access Evaluation overview

With the rise of remote work and the increasing complexity of cyber threats, maintaining robust security without disrupting user productivity is a significant challenge for IT administrators. Microsoft’s Entra ID Continuous Access Evaluation (CAE) is a powerful solution designed to meet this challenge, providing a dynamic security posture that adapts...

Read More

Entra Connect Sync versus Cloud Sync

In the realm of identity management, organisations often face the challenge of synchronising on-premises directories with cloud environments. Microsoft provides two primary tools to achieve this: Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync. Both are designed to synchronise user identities between on-premises Active Directory (AD) and Microsoft Entra...

Read More

Comparing Active Directory and AD LDS

When it comes to managing identities, access, and directory services within an organisation, Microsoft’s Active Directory (AD) and its variant, Active Directory Lightweight Directory Services (AD LDS), have been pivotal tools for IT professionals. With the evolution of cloud computing, Entra ID (formerly known as Azure Active Directory) has emerged...

Read More

Comparing AD, AWS Managed Domain and Azure ADDS

In today’s enterprise landscape, identity management is key to ensuring secure and efficient access to resources. Three widely-used directory services that address these needs are Active Directory (AD), AWS Managed Domain, and Azure AD Directory Services. In this blog, we will explore the pros and cons of each service, including...

Read More
Follow
Follow