Interlink Cloud Blog
Matt Scherocman

Microsoft EMS Case Study: Interlink Sets G&J Pepsi Free to Innovate, Collaborate and Grow

Microsoft EMS Case Study: Interlink Sets G&J Pepsi Free to Innovate, Collaborate and Grow

G&J Pepsi Cola is the largest family-owned and operated Pepsi franchise bottler in the United States. Over 1,000 of their 1,600 employees are made up of deskless workers, including drivers, salespeople, and merchandisers. Not yet utilizing mobile devices, this sizable workforce did their job based on paper marching orders each morning. Over time, these paper instructions became hefty books that field people lugged around and rummaged for information.

hybrid Use Benefit quoteRealizing the need for change, G&J transitioned from paper to electronic documents and outfitted its deskless workforce with Android smartphones. The move created hundreds of new, unsecure and unoptimized mobile endpoints.

hybrid Use Benefit case study

Here’s just a couple of ways Interlink used the full value of Microsoft enterprise cloud products to meet G&J’s business challenge.

  • Secured the Digital Link with Microsoft EMS
    Using Microsoft Enterprise Mobility + Security (EMS), Interlink quickly secured 1,200 smartphones and tablets.

    With the mobile devices secure, G&J corporate offices, distribution centers, and field employees can now communicate and collaborate without having to worry about endpoint security. Management is free to share sensitive data in real time with other business units, decreasing data availability downtime while increasing efficiency of response to changes in operations.
  • Extended Microsoft EMS with Azure Active Directory Premium
    G&J uses several different applications across their IT infrastructure, all deployed with the challenge of needing to be secure and easily accessible. Using Azure Active Directory Premium, Interlink streamlined the management of these applications and improved the secure accessibility of multiple applications.

    By using a cloud-based single-sign-on (SSO), G&J consolidates application management and usage into one simple process. IT no longer needs to spend time and resources configuring multiple sets of credentials, and field employees never need to be concerned about not having access to their suite of third-party applications.

Read the full case study and see how Interlink met G&J Pepsi’s business mobility challenges with Interlink and Microsoft EMS.

hybrid Use Benefit case study

Contact us to show you how we can improve your collaboration, security, and mobility with Microsoft EMS too.  

Jason Wingert

Your Biggest Business Threat is The One You Can’t See: How to Battle it With Microsoft Security Solutions

Your Biggest Business Threat is The One You Can’t See: How to Battle it With Microsoft Security Solutions

Cyber-attacks are sophisticated security intrusions that cost organizations $4 billion dollars per year. Because of the growing risk of cyber threats, Microsoft has outlined the anatomy of how a cyber breach occurs and the different response options available to regain control of a compromised system in an interactive infographic.

view the infographic microsoft security

Using research from leading IT security experts, the anatomy of a data breach demonstrates that all it takes is a small lapse in cyber security to open up your network to a series of devastating attacks.

Modern IT infrastructure requires a robust suite of security solutions that can detect threats and provide managers with appropriate response options. Understanding the anatomy of a breach can help you understand which Microsoft security products can keep your data safe.

Interlink has seen the challenges with cloud security and the solutions, and we can help keep your identities and data safe. 

Connect with Interlink Cloud Advisors today.

Matt Scherocman

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

As business changes and technology evolves, the majority of organizations depend on IT systems to store their data and run critical workflows. Unfortunately, these systems can be a prime target for cyber-attacks as sophisticated hackers put the enterprise in a vulnerable position. Just take note of these especially stunning stats:

  • 76% of attacks stem from compromised user credentials
  • The average cost of a data breach to a company is $3.5 million and total cost of cybercrime on a global scale is as high as $500 billion
  • Because of dangerous IT security blind spots (shown in the image below), it could take over 200 days to detect an attack

    IT blind spots Microsoft Advanced Threat Analytics

Stats courtesy of Microsoft Advanced Threat Analytics Datasheet.

The reality is, businesses need to pay attention and adapt to this changing nature of data security threats.

Now available in the Enterprise Mobility Suite, Microsoft Advanced Threat Analytics (ATA) helps to protect your company from attacks by leveraging machine learning. It uses behavioral analytics to uncover suspicious behavior, internally or from external attacks. It also detects known security issues and risks , the goal is to stay  one (or two, or three) steps ahead of the attackers.

Microsoft Advanced Threat Analytics

When you think of security software, your mind might immediately turn to configuring system rules and alerting. All of which take time and commitment from your team. With ATA, you don’t need to create rules, baselines, or thresholds. It’s streamlined from setup and works immediately. Once a threat is detected, it’s also easy to view a timeline of when the attack hit. It can help pinpoint where the breach took place. All of this insight can better prepare you for future attacks.

The thought of being hacked and not even knowing it is scary enough, but ATA also helps identify internal threats like why a user would be accessing files in accounting if they’re in the marketing department? Combined with online security reports, ATA can show anomalies for logins.  It will help detect when user credentials have been compromised by reporting geographically distant logins that occur at the time time – like a single user being logged in from Ohio and from Romania at the same time.  

The high-level benefits of using ATA at your business are obvious. Peace of mind goes a long way, and you also want it to help you adapt as cyber-attacks grow in frequency and sophistication. The features of ATA are even more appealing when you see exactly how it works for your business. Here are a few of our favorites:

  • Timeline: We’ve already mentioned that timeline, but it’s worth noting again. In addition to listing the activities as they occur, ATA provides recommendations on how to handle that alert.
  • Organizational Security Graph: This maps out entity interactions which represents the context and activities of the users, devices, and resources. This will be a big driver in managing security for each of your users.
  • Email Alerts: There’s no need for one person to be continuously monitoring for cyber-attacks. With ATA, you can have emails sent to users or groups when suspicious activity is detected.
  • Leveraging the Cloud:  Microsoft cloud based correlation engine helps more quickly identify new attacks and reduce the amount of false positives. 

The cyber-attack threat is real and ATA can help you adapt to the changing cyber-attack world we live in.

Contact Interlink if you any questions.

 

Matt Scherocman

Three Ways Microsoft Enterprise Mobility Suite (EMS) Has Changed Everything

Three Ways Microsoft Enterprise Mobility Suite (EMS) Has Changed Everything

Looking at how technology has evolved, the cloud has certainly changed everything in terms of how we do business and what’s expected of us as a company. The cloud has created a ton of benefits and possibilitieslike the promise for users to be able to work anywhere on any device. That flexibility also created several challenges. Those challenges include security, device management, and data protection.

 
[...]
Sarah Bunt

On-Demand Webinar: Understanding Microsoft's Enterprise Mobility Suite

EMS On Demand Webinar

Ready to solve the unique challenges of your mobile workforce?

Enable your users to be productive on the devices they love, while helping keep corporate data private.

In this on-demand webinar Microsoft and Microsoft Heartland Area Partner of the Year, Interlink Cloud Advisors, explore the possibilities of Microsoft’s Enterprise Mobility Suite – the only cloud solution built to affordably deliver access to apps and data across all devices, while helping keep your business secure.  

view webinar slides

Cover the different aspects of Enterprise Mobility Suite, including:

  • Control Identities of Users – Single Sign on / Self Service Password Reset / Multifactor Authentication / Security Reporting
  • Mobile Device Management – Bring your own device support / selective wipe/ non-domain PC controls
  • Intellectual Property Management – Lock down files so that only the right people have access, audit and monitor access to protected files, restrict ability of users to do things like cut / paste or printing
  • Cyber Security– visibility into user and network access to protect against attacks, malicious behavior, and security risks
  • Application Management - manage and protect corporate apps and data on almost any device

Register today if you want to find out if Microsoft’s Enterprise Mobility Suite is right for your company.

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.

Blog Categories

Interlink Cloud
Interlink Cloud
6 post(s)
Tips and Tricks
Tips and Tricks
2 post(s)
Outlook
Outlook
2 post(s)
Reporting
Reporting
1 post(s)
Cloud Storage
Cloud Storage
2 post(s)
Webinars
Webinars
16 post(s)
OneDrive
OneDrive
5 post(s)
Yammer
Yammer
3 post(s)
Azure
Azure
23 post(s)
SharePoint
SharePoint
10 post(s)
Microsoft
Microsoft
7 post(s)
SQL 2016
SQL 2016
2 post(s)
Lync
Lync
8 post(s)
Office 365
Office 365
61 post(s)