At Microsoft, we consistently look to cut costs and incorporate best-of-breed internally developed solutions. But we do license third-party software for some applications. Learn how Microsoft IT developed the infrastructure and processes necess
Cloud experts from Microsoft discuss modernizing applications, cultural changes that lead to digital transformation, migrating on-premises data centers to the cloud, security in the cloud, shadow IT, planning a move to the cloud, application de
Cloud experts from Microsoft discuss modernizing applications, cultural changes that lead to digital transformation, migrating on-premises data centers to the cloud, security in the cloud, shadow IT, planning a move to the cloud, application de
Bring your coworkers together with Microsoft Teams! We'll show you how to connect with your team using channels to chat, call, meet, and store shared files. A chat-based workspace in Office 365, Teams is a hub for collaboration that gives you s
SharePoint experts from Microsoft discuss topics ranging from setting up sites—communication sites, hub sites, and site design templates—to regional performance issues, security issues, multi-geo capabilities, and search. You’ll learn about con
SharePoint experts from Microsoft discuss topics ranging from setting up sites—communication sites, hub sites, and site design templates—to regional performance issues, security issues, multi-geo capabilities, and search. You’ll learn about con
In the last episode of this six-part Securing our Enterprise series, our Chief Information Security Officer, Bret Arsenault, notes that while there is a lot of change in any type of transformation, if security is done right, it can enable all o
In the last episode of this six-part Securing our Enterprise series, our Chief Information Security Officer, Bret Arsenault, notes that while there is a lot of change in any type of transformation, if security is done right, it can enable all o
Make the most of Outlook! We show you best practices for managing your email and calendar efficiently, including switching views in calendar and email, scheduling meetings and conference rooms, and categorizing your appointments with colors. Le
In episode five of the Securing our enterprise six-part series, our Chief Information Security Officer, Bret Arsenault explains the steps he and his team are taking for risk management to ensure customer and employee data are protected and the
In episode five of the Securing our enterprise six-part series, our Chief Information Security Officer, Bret Arsenault explains the steps he and his team are taking for risk management to ensure customer and employee data are protected and the
Move to the cloud with OneDrive for Business! We show you how to get started with OneDrive for Business, including how to store, share, and access documents securely. A cloud-based document library, OneDrive for Business integrates with Office
As the digital transformation continues to accelerate business practices, complex and unstructured data sets are inundating enterprises on a day-to-day basis. In episode four of this six-part series, Bret Arsenault shares how he and his team le
As the digital transformation continues to accelerate business practices, complex and unstructured data sets are inundating enterprises on a day-to-day basis. In episode four of this six-part series, Bret Arsenault shares how he and his team le
Identity sits at the very center of the enterprise threat detection ecosystem. Proper identity and access management is critical to protecting an organization, especially in the midst of a digital transformation. This part three of the six-part
Identity sits at the very center of the enterprise threat detection ecosystem. Proper identity and access management is critical to protecting an organization, especially in the midst of a digital transformation. This part three of the six-part
Skype for Business experts from Microsoft discuss client version control, problem management and incident resolution, collaboration with Microsoft Teams, tools for monitoring service availability and quality, network infrastructure issues and c
Skype for Business experts from Microsoft discuss client version control, problem management and incident resolution, collaboration with Microsoft Teams, tools for monitoring service availability and quality, network infrastructure issues and c
Keeping both customer and Microsoft data secure goes beyond information protection. It ensures connected devices producing data are also protected. This is no easy task for a global enterprise like Microsoft, but Arsenault and team do an except
Keeping both customer and Microsoft data secure goes beyond information protection. It ensures connected devices producing data are also protected. This is no easy task for a global enterprise like Microsoft, but Arsenault and team do an except
Security experts from Microsoft discuss phishing, malware protection, threat intelligence, and more. They share candid insights and best practices about using Advanced Threat Protection in Azure, Windows 10, and Office 365 to combat sophisticat
Security experts from Microsoft discuss phishing, malware protection, threat intelligence, and more. They share candid insights and best practices about using Advanced Threat Protection in Azure, Windows 10, and Office 365 to combat sophisticat
In the Securing our enterprise series, Arsenault will share a very curious but practical analogy on how he and his team are balancing information protection, device health, identity management, and data telemetry with risk management during the
In the Securing our enterprise series, Arsenault will share a very curious but practical analogy on how he and his team are balancing information protection, device health, identity management, and data telemetry with risk management during the
At Microsoft, we do everything we can to help our people be productive, learn quickly, and stay focused on their work. Our internal program—Work Smart—helps teach people how to be their most productive using Microsoft solutions. Work Smart incl