fbpx
Share

7 Minutes of Security: Microsoft Surface

In our second 7 Minutes of Security episode, host and National Practice Manager – Security, Richard Dornhart consults Mackenzie Jackson, Microsoft Device Specialist, to understand how Microsoft provides Surface users with inbuilt security, from the chip to cloud.

Get multi-layer protection with Surface and Microsoft 365

With built-in protection from chip to cloud, a Surface fleet offers complete control and peace of mind. It’s all thanks to a unique in-house approach, with every layer of security built and maintained by Microsoft themselves.

For your users, this means proactive protection and uninterrupted productivity, while IT can enjoy seamless and confident device management.

Level up authentication with YubiKey

Meet the industry-leading security key that works alongside Windows Hello on your Surface device to enable multi-factor and password-less authentication.

Evaluate a Surface demonstration unit and take your device security to the next level with a free YubiKey1.

Request Demonstration Unit

1.Terms and conditions apply. Available to the first 25 eligible customers over 100 seats. Contact a Surface Specialist for more information.

Tags: Device Security, Microsoft, Microsoft 365, Microsoft Surface, Mobility Security, Security

Featured

Related

Microsoft-JIT2023-S1-Amplification-Session-Blog-Card-04
Information protection in an age of information theft

Managing and safeguarding data across various apps, clouds, and endpoints is an uphill battle. It’s led to organisations relying on…

Customer Story: Knight Frank

Cloud Transition an Azure Success Story for Knight Frank Download Customer Story Contact a Specialist Objective…

3CX Desktop App Critical Vulnerability Alert

The Australian Cyber Security Centre has issued a warning about a new supply chain attack that has targeted a…

Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…