Over the past several years, the demand for cloud infrastructure services has quickly grown with recent revenues reaching well over $23.6 billion, up 93% from the previous year. Recognizing this, Microsoft has made massive investments in data centers all around the world to become the leader in the global public cloud services market, along with having the most comprehensive set of compliance offerings of any cloud service provider.
In the coming year, how will your organization be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support?
Quick answer: Review the chart below and ensure that your Microsoft products are not about to expire. The chart quickly points out some significant end-of-life/support dates that are on the horizon for some of the more popular Microsoft products, including Windows 7, Exchange 2010, and Office 2010.
It seems these dates are far out, but in reality, upgrade discussions should begin now in order to prepare appropriately. By applying upgrades before products fall out of support, your business will be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support.
It's a new year which makes it a great time to prioritize your technology initiatives. As technology changes dramatically, the headlines continue to focus on the same themes: Security, Cloud, and Digital Transformation. In this blog article, I will review important "to do's" within each category and offer ways you and your organization can achieve these important IT goals.
In this cloud-first, accessible-anywhere world of computing, there are many questions around how your organization's users access cloud data that was once secured within your on-premises network. In the traditional sense, in-house technologies have been used to deploy workstations, manage endpoints, and enforce required security policies. However, what do you do when neither your users nor your data reside within the office?
In this blog article, I will be discussing a newer Microsoft-created technology that is becoming today's 'Modern Desktop.' A bundle, if you wish, of email, collaboration tools, mobility, security, and more.
Your organization’s data is in the cloud, so now what? Is it secure? Where is it? Is it readily available? Who is accessing it?
Most employees want to be productive. As cloud service consumers, they have become accustomed to finding a tool or app that will help fill a need and simply buy it without obtaining approval from the organization first. This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.
Over the past four decades, organizations of all sizes have seen a significant change to how they do business, due to evolving technologies. And now, as we approach the end of the 2010's decade, the term “Digital Transformation” is abound and you might ask, "Haven’t we already done enough transforming?"
I packed my cloud bag and in it I placed...
As we've begun to adopt a myriad of cloud-based services, our network perimeter has become more expansive and therefore, potentially more porous. Cloud services may need additional firewall ports open, which is equivalent to opening more doors into your home. On top of this, your employees are now working wherever they want and they’re using a handful of different devices. Last but not least, your data is racking up an impressive amount of frequent flier miles as it travels and gets stored in platforms strewn all across the country.
Are you aware of the amount of data you have? Do you know how to manage your data growth? Do you know how long it will take to recover your critical data and applications in the event of a disaster?
I spent a lot of time early in my career solving complicated problems related to security. In the late 1990's, I consulted as a civilian for the NSA to help automate the 'need-to-know' access of their internal web infrastructure and documentation. I followed that with some time as a Reserve Information Operations Officer for the U.S. Army, and then working for financial services companies including VISA during the birth of the PCI standards. Needless to say, the security field is one with overwhelming depth and it can be challenging for companies to make an iterative, incremental plan to become more secure.