Greetings everyone and it is nice to connect again as Q1, 2020 comes to a close. While the stock the market has been turbulent due to the Corona virus spread, businesses still seem very confident and are investing. Let's hope for the best that we all remain safe and good options are developed in time to contain and eliminate the spread.
We have streamlined our services in three distinct areas to increase or focus and delivery more value to our customers:
Content and Collaboration : This continues to be a healthy practice taking customers workloads into the cloud
Cloud Infrastructure and Security : Our focus in this area is to help with Identity and Access Management, End Point Management, Information Protection Management, and Threat Analytics.
Business Applications : Our focus in this practice is to develop business applications using Power Platform, Azure Custom Apps, Data Warehouse and analytics, and Artificial Intelligence / Machine Learning based applications
Our continued focus on the Microsoft cloud (all three ─ Microsoft 365, Dynamics 365, and Azure) has proven to be a successful bet and companies are reaping the rewards.
In addition to the Microsoft cloud, we are also focusing on the Nintex platform with an emphasis on Robotic Process Automation (RPA). We continue to see traction in this area as companies use RPA to automate many of their business processes. Nintex has been a great addition to our portfolio for providing additional value to our customers.
This newsletter is focused on the Security and Compliance as it is a hot topic needing a great deal of advice. Netwoven's Cloud Infrastructure and security practice works with customers to create a Zero Trust security environment covering the following areas:
Whether you are working with all Microsoft products or have a heterogeneous environment with other products, Netwoven consultants can help you define the roadmap, architecture and work with you on your implementations.
I look forward to a productive and exciting association with all of you in 2020. Please feel free to reach out to me anytime at email@example.com if I can be of some help.
We all know how fast technology changes and keeping up to date can be an uphill battle. Not only does the technology change, but it also leads to changes in the methodology, principles and the way we think and act.
Security is one of these areas going through this shift currently – with Identity & Access Management being a core foundation.
Now, with the shift and trend towards cloud computing, corporate resources are no longer within the physical walls of the locations and remote workers are much more prevalent. So, both workers in the office and outside of the office walls are connecting to the same services.
Since these services are no longer just within company walls, the way anybody access them has to be secured. Firewalls on the network no longer serve an effective purpose from a security focus standpoint. Security now has to focus on validating that person is who they say they are, before allowing them just enough access to services they need to be productive.
Confidently and quickly validating that person's identity is now the key focus. With so many breaches in corporate systems and dispersal of credentials, username and password is not enough of a secure standard to confidently confirm you are who you say you are!
The perimeter is now extended around each user, not the physical location or building itself. Since users are accessing resources on many different devices and from any location, validating who you are and assigning just the right amount of access is key. Microsoft has made great strides in IAM, with password less authentication, streamlined MFA, dynamic services like Conditional Access, and Privileged Identity Manager to name a few.
This is not a new term and has been in use for many years with emails. Several companies used products like Titus, Vera, Seclore, and Digital Guardian to apply DRM to documents for IPM. With Microsoft' Azure Information Protection (AIP) capability, IPM is now available at the platform level with Microsoft 365. Various features are available in different SKUs of Microsoft 365.
With the renewed focus on protecting intellectual property, companies are looking into AIP to implement an IPM strategy. AIP provides many capabilities to help protect your intellectual-property:
Developing an IPM strategy is not an easy undertaking but if implemented well, it can have positive benefits for the organization. Developing an IPM strategy requires analysis and planning of the following areas:
Netwoven consultants are well versed to help define and execute a strategy to secure your Office 365 and other repositories. You can reach out to us at firstname.lastname@example.org for FREE consultation.