Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Microsoft 365

Microsoft Buys Clipchamp Video Creation App

by Russell Smith

Last week, Microsoft announced that it had bought Clipchamp, a browser-based video creation app. Founded in 2013, Clipchamp's mission is to enable everyone to tell stories using video. Microsoft recognizes video is a powerful medium but that it has been traditionally difficult for most people to produce high quality videos that are worth sharing. Artistic… Read More

How to Deploy Zero Trust Identity Security

by Vignesh Mudliar

This is the second article in the Zero Trust Security in Microsoft 365 series. Here you will gain an understanding of the strategies to deploy Zero Trust Identity Security. Managing identity will always be at the forefront of this security model. Environments with proper identity policies are better placed to handle attempts at gaining access… Read More

What is Microsoft Test Base

by Michael Reinders

Microsoft recently announced that 'Test Base for Microsoft 365' has moved from the private preview stage to public preview. The company announced a set of new features that makes it easy to validate your company's apps against the latest Windows client and server releases, from the comfort of a Microsoft-managed test environment. They've also taken… Read More

How to Create an Approval Workflow in Teams

by Michael Reinders

Introduction One of the most important workflows in a business is the approval process. This can range from administration-like approvals like vacation requests, expense reports, and document signoffs. However, there is almost an innumerable amount of approval categories in the business world besides these. Think Finance, Manufacturing, HR, heck, even IT. (Imagine having to get… Read More

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: