General

Telstra Calling for Office 365 | FAQ

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" text_align="left" background_animation="none" css_animation=""][vc_column][vc_column_text]Do I need to purchase pre-requisite Microsoft licences from Telstra? If you currently purchase your licences from another Microsoft Cloud Solution Provider (CSP), then you will need to move your pre-requisite licence subscriptions to Telstra in order to purchase Telstra Calling...

0
0

Exploits do not Stop Evolving, and Neither Should Security

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" text_align="left" background_animation="none" css_animation=""][vc_column][vc_column_text]I’ve written a few posts on security lately, and on what Microsoft is continuing to do in this area – particularly around a suite of (increasingly) integrated solutions rather than a single point product. Think EM+S and Microsoft 365...

0
0

Why choose Microsoft Azure

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" text_align="left" background_animation="none" css_animation=""][vc_column][vc_column_text]Microsoft Azure is a cloud services platform. What is a cloud services platform you may ask? A cloud services platform is essentially access to servers and data centers that are off-site. With Microsoft Azure, you have access to their robust...

0
0

3 ways that Azure Improves your Security

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" text_align="left" background_animation="none" css_animation=""][vc_column][vc_column_text]Did you know that the average large organisation gets 17,000 security alerts each week! Companies of all sizes are constantly exposed by evolving security threats and with retaining qualified security talent to respond to these threats. As you look for solutions...

0
0

Security is the new…… security?

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text]For as long as I can remember we’ve been talking about security in IT. From the first time I saw the Monkey virus destroy the MBR on a PC through to boundary security and now various flavours of...

0
3