29Apr2020
15Apr2020
We need “MDATP Lite,” not full MDATP, in order to complete Defender’s value proposition in the SMB–and this is what it looks like
TL;DR: Just give me the device risk level with a description of "why" so I can follow up with potentially at-risk users. You can keep Advanced Hunting, etc.So many people I talk to in the SMB community think that they want MDATP. Well, it is available now as an independent...
10Apr2020
What is the biggest opportunity for IT Service Providers and Consultants today, in light of COVID-19?
I got this question from a reader named Rob the other day. The full question is actually a bit more detailed and revealed a lot more about the author of the question--so I've only included an abridged version that pulls out the heart of the inquiry that I'm addressing here...
08Apr2020
Updated! Checklist co-developed with Microsoft: Set up your SMB customers for secure remote working
I had the great pleasure to participate in a webinar today with David Bjurman-Birr (Partner Architect) and Jon Orton (Director of Product Marketing for Microsoft 365 SMB). David and I recently developed a checklist together for Microsoft 365 Business Premium, aimed at helping partners who work in the SMB space...
06Apr2020
Inventory and Control of Apps within and beyond the perimeter with Microsoft 365
Managing devices is a topic I have probably burnt my readers out on by this point, so it's time we move into the next stage: wrangling all those crazy third-party applications hiding out in your environment! To build up a foundation of good security, we must identify our apps and...
01Apr2020