Securing your identities, devices and data using Microsoft’s Zero Trust Model

Q1 - 2020


Greetings everyone and it is nice to connect again as Q1, 2020 comes to a close. While the stock the market has been turbulent due to the Corona virus spread, businesses still seem very confident and are investing. Let's hope for the best that we all remain safe and good options are developed in time to contain and eliminate the spread.

We have streamlined our services in three distinct areas to increase or focus and delivery more value to our customers:

Content and Collaboration : This continues to be a healthy practice taking customers workloads into the cloud

Cloud Infrastructure and Security : Our focus in this area is to help with Identity and Access Management, End Point Management, Information Protection Management, and Threat Analytics.

Business Applications : Our focus in this practice is to develop business applications using Power Platform, Azure Custom Apps, Data Warehouse and analytics, and Artificial Intelligence / Machine Learning based applications

Our continued focus on the Microsoft cloud (all three ─ Microsoft 365, Dynamics 365, and Azure) has proven to be a successful bet and companies are reaping the rewards.

In addition to the Microsoft cloud, we are also focusing on the Nintex platform with an emphasis on Robotic Process Automation (RPA). We continue to see traction in this area as companies use RPA to automate many of their business processes. Nintex has been a great addition to our portfolio for providing additional value to our customers.

This newsletter is focused on the Security and Compliance as it is a hot topic needing a great deal of advice. Netwoven's Cloud Infrastructure and security practice works with customers to create a Zero Trust security environment covering the following areas:

  • Identities
  • Devices
  • Applications
  • Data
  • Infrastructure
  • Networks

Whether you are working with all Microsoft products or have a heterogeneous environment with other products, Netwoven consultants can help you define the roadmap, architecture and work with you on your implementations.

I look forward to a productive and exciting association with all of you in 2020. Please feel free to reach out to me anytime at if I can be of some help.

Identity and Access Management

We all know how fast technology changes and keeping up to date can be an uphill battle. Not only does the technology change, but it also leads to changes in the methodology, principles and the way we think and act.

Security is one of these areas going through this shift currently – with Identity & Access Management being a core foundation.

Now, with the shift and trend towards cloud computing, corporate resources are no longer within the physical walls of the locations and remote workers are much more prevalent. So, both workers in the office and outside of the office walls are connecting to the same services.

Since these services are no longer just within company walls, the way anybody access them has to be secured. Firewalls on the network no longer serve an effective purpose from a security focus standpoint. Security now has to focus on validating that person is who they say they are, before allowing them just enough access to services they need to be productive.

Confidently and quickly validating that person's identity is now the key focus. With so many breaches in corporate systems and dispersal of credentials, username and password is not enough of a secure standard to confidently confirm you are who you say you are!

The perimeter is now extended around each user, not the physical location or building itself. Since users are accessing resources on many different devices and from any location, validating who you are and assigning just the right amount of access is key. Microsoft has made great strides in IAM, with password less authentication, streamlined MFA, dynamic services like Conditional Access, and Privileged Identity Manager to name a few.

Information Protection Management (IPM)

This is not a new term and has been in use for many years with emails. Several companies used products like Titus, Vera, Seclore, and Digital Guardian to apply DRM to documents for IPM. With Microsoft' Azure Information Protection (AIP) capability, IPM is now available at the platform level with Microsoft 365. Various features are available in different SKUs of Microsoft 365.

With the renewed focus on protecting intellectual property, companies are looking into AIP to implement an IPM strategy. AIP provides many capabilities to help protect your intellectual-property:

  • Encryption of content in the form of preventing download, copy, print, screen capture
  • Reporting and Analytics to monitor the flow of information
    Comprehensive suite of software for managing existing data and new data
  • Ability to protect various types of files such as productivity files, CAD files, Software code files

Developing an IPM strategy is not an easy undertaking but if implemented well, it can have positive benefits for the organization. Developing an IPM strategy requires analysis and planning of the following areas:

  • Types of files
  • User base (internal and external)
  • Types of repositories
  • Application
  • and / or New content

Netwoven consultants are well versed to help define and execute a strategy to secure your Office 365 and other repositories. You can reach out to us at for FREE consultation.

Read more on our blogs for Microsoft information protection

Let's Start

Find out how we can help you with your organization’s digital transformation journey.

Prefer to call?   +1 877 638 9683

Note: By submitting, you consent to Netwoven processing your information in accordance with our privacy policy. We take your privacy seriously; opt out of email updates at any time.

By clicking "submit", you agree to our privacy policy