Enforcement of Mandatory MFA for Microsoft Azure
Discover how Microsoft’s Secure Future Initiative aims to boost cybersecurity with mandatory Azure MFA.
Each month, Keller Schroeder’s subject matter experts provide content about the latest tools, services, and technologies to help you understand how you can better grow, protect, and optimize your technical environments. We also share weekly cybersecurity tips and you can find business cultural and leadership knowledge from our President.
Discover how Microsoft’s Secure Future Initiative aims to boost cybersecurity with mandatory Azure MFA.
Joe Dunn, Senior DBA and Senior Data Engineer for Keller Schroeder explores the rapidly changing DBA Services environment and discusses the impact of many of the newer technologies on that landscape for the DBA professional.
As companies look at cutting costs, we wanted to share insights on how you could reduce your technology costs without sacrificing performance.
Matt Barton – [Director, Data Center Services] Quick quiz: How many of the following Cloud related terms can you define? IaaS, PaaS, SaaS, DRaaS, BaaS, HPC, AI, BI, Cloud Native, Private, Hybrid, Public, Hyperscale, Serverless, Burstable, Elastic, CDN, EC2, Containers,
Eric Maurer – [Applications Consultant] What if your devices could talk? The Internet of Things (IoT) can start to do this! What is the IoT? Putting it simply, an IoT “thing” is nothing more than a physical device connected to the
Matt Barton – [Senior Consultant] Ok… 3 Questions, 30 Seconds, 300 Words…. about your backup solution. This shouldn’t take long. Question 1 : Do you have an off-site backup? Yes? Great! No? Why Not? Using Veeam & Azure, quickly
Rob Wilson – [Business Unit Director – Application Solutions] Hint: You have to say it with an Italian accent, like “That’s one spicy a-meatball!” In our neck of the woods, folks tend to watch with a curious skepticism as the
Chance Webster – [Systems Engineer] We have all seen stories on the news about company information being accidentally disclosed because of employee error or stolen during a breach of a company’s security infrastructure. In many cases, company’s data is critical and
Want to receive our monthly newsletter? Send us your contact info below to join our mailing list.