Virtual Cafe

 

Time for a Coffee Break?

 

 

Join us from time to time.  Pose questions, read about our latest activity or just hangout while you grab your coffee.  
 
 

    LinkedIn Company Updates

  • Sorry, no posts were received from LinkedIn!
 
 
 

18/07/2017

Advanced Threat Analytics – Demonstrating Attack Detection

Introduction In my previous blog post regarding ATA, we looked at setting up ATA in a lab to walk through the process end-to-end, and show some […]
06/06/2017

Enabling Azure Network Security Group (NSG) flow logging in bulk

As we speak one of my customers is looking into using Azure Network Watcher for its network auditing and packet logging capabilities. Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. While flow logs target Network […]
23/05/2017

Deploying Azure Resource Policies 2: Limit Azure Regions

This blogpost is the second blogpost of applying governance in Azure. Many organizations that are moving to Azure would like to enforce data sovereignty and ensure that no resources can be deployed outside of the country. One of my customers needed to make sure that no Azure resources would be deployed outside of Australia. This […]
28/04/2017

Deploying Azure Resource Policies

Hi all, Before deploying anything in Azure you should think about Governance. You must address the topic of governance early to ensure the successful use of the cloud within your enterprise.  After a series of really intense governance workshops my customer was ready to apply the decisions made from those workshops in Azure. In those workshops we […]

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Get in touch

Your Name (required)

Your Email (required)

Subject

Your Message

Book a Demo

Your Name (required)

Your Email (required)

Phone Number(Optional)

Ask a Question

Your Name (required)

Your Email (required)

Phone Number(Optional)

Your Message

Book Assessment

Evaluate your modern workplace security posture and validate it against current best practices with a Microsoft Secure Score Assessment, from cubesys

Your Name (required)

Your Email (required)

Phone Number(Optional)

Book your Windows Analytics Deployment

Your Name (required)

Your Email (required)

Phone Number(Optional)