Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Mike Wilson

Addressing Confusion Around Microsoft’s 4 Advanced Threat Protection Solutions

Advanced-Treat-Protection-Solutions

You may have noticed that there are currently four Microsoft products with “Advanced Threat Protection” in their name:

  1. Azure Advanced Threat Protection
  2. Office 365 Advanced Threat Protection
  3. Windows Defender Advanced Threat Protection
  4. SQL Advanced Threat Protection

While each of these solutions offers value to its users, there’s been some confusion around the similar naming of these products. Let’s clear up confusion by taking a closer look at each of these products and their features, benefits, and intended use cases.

Continue reading
  9359 Hits
  0 Comments
Mike Wilson

Single Sign-on (SSO) Options with Azure Active Directory

Single Sign-on (SSO) Options with Azure Active Directory

Figuring out the best way to implement Single Sign-On (SSO) in a Microsoft cloud environment can be challenging given how the options have evolved over time, but it’s a key component of any successful Office 365 or Azure deployment. There are four main options on how you can configure SSO:

Continue reading
  105451 Hits
  1 Comment
Mike Wilson

Device Management | Comparing System Center Configuration Manager vs. Intune vs. Hybrid

Device Management | Comparing System Center Configuration Manager vs. Intune vs. Hybrid

In the modern workplace, chances are that your employees are using their in their own devices for work, which often results in unsecure access to company files. This creates a challenge because organizations need to be able to secure their company’s data on these devices without violating personal information. Also, if an employee leaves the organization, it’s important to have a means to avoid wiping their personal information from their devices.

With your company’s valuable data in mind, Microsoft has created two device management services that allow you to secure your organization’s data - no matter what device is being used. Microsoft Intune and Microsoft System Center Configuration Manager are both good options for device management, but it can often be hard to determine which option is best for your business. Sometimes it’s better to run a hybrid of them both.

Continue reading
  6621 Hits
  0 Comments
Matt Scherocman

How Microsoft Solutions Can Help Identify Your Leaked Credentials

How Microsoft Solutions Can Help Identify Your Leaked Credentials

Hackers are dedicated to getting into and compromising your systems. They can use sophisticated coding techniques to get around or break through your security defenses. Unfortunately, many times that type of extensive effort isn’t necessary because organizations make it easy for hackers to steal credentials by failing to have adequate defenses in place.

Nearly two out of every three confirmed data breaches involve weak, default, or stolen passwords.1 In total, according to Microsoft, tens of millions of credentials are exposed every month and are added to growing lists on the dark web. These stolen user IDs and passwords are extremely valuable to cyber thieves since three of every four users re-use credentials across multiple sites and continue to use the same credentials for years.2

Continue reading
  2158 Hits
  0 Comments
Matt Scherocman

Microsoft Rights Management – Three Different Options to Best Fit Your Information Needs and Budget

Microsoft Rights Management – Three Different Options to Best Fit Your Information Needs and Budget

Microsoft has three different levels of functionality around controlling access to critical intellectual property with rights management. 

Here is a quick summary of Microsoft's Rights Management offerings:

1) Rights Management Service for Office 365

Included in the E3 Service

This option is for those who want base level security and the ability to keep documents that are stored in the cloud secure. It does not protect documents stored locally on a file share, but there is a connector available for Exchange and SharePoint.

Continue reading
  2663 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.