logo ms social

Add Azure Active Directory (Azure AD) as an identity provider for External Identities

Azure Active Directory is available as an identity provider option for B2B collaboration by default. If an external guest user has an Azure AD account through work or school, they can redeem your B2B collaboration invitations or complete your sign-up user flows using their Azure AD account. This technical blog post shows you how to permit guest users to sign in with their Azure AD account, verify publishers’ domain and walks you through next steps. Read it for a quick demo.

Read More…

Add Azure Active Directory (Azure AD) as an identity provider for External Identities Read More »

wp IDC builtin hardware sec thumb

Holistic Endpoint Security Requires Built-In Hardware-Based Defenses

Developing an effective security plan that protects far-flung devices in hybrid workspaces isn’t easy. Cybercriminals just need one door open at an endpoint to compromise your systems and steal valuable data. Download this thought-provoking HP whitepaper detailing how hardware-based root-of-trust technologies that deliver security below and within operating systems offer the best protection.

View: Holistic Endpoint Security Requires Built-In Hardware-Based Defenses

Holistic Endpoint Security Requires Built-In Hardware-Based Defenses Read More »

maxresdefault 2

Azure Active Directory – The Ultimate Beginners Guide


In this video, Andy Malone, Microsoft MVP and certified trainer, demos Azure Active Directory (Azure AD) basics. From architecture to setting up users to assigning licenses, Andy walks through everything you need to know to make the most of Azure AD’s rich functionality. Ready to learn! Watch the demo to participate in a busy section packed with demos.

Azure Active Directory – The Ultimate Beginners Guide Read More »

Your security must protect your organization from #cyberattacks in today’s vulnerable hybrid environment. Reply to hear from one of our experts in @HP Wolf Security about ideas to keep you safe.

Your security must protect your organization from #cyberattacks in today’s vulnerable hybrid environment. Reply to hear from one of our experts in @HP Wolf Security about ideas to keep you safe.

Your security must protect your organization from #cyberattacks in today’s vulnerable hybrid environment. Reply to hear from one of our experts in @HP Wolf Security about ideas to keep you safe. Read More »