Your cloud platform is your foundation in enabling and servicing your business with technology. The risks of costs associated with not establishing the foundation right from day one can be significant. By building the right scaffolding and guardrails, you’ll set the direction of your cloud deployments and ensure your environment is secure and governed with enterprise scale standards.
Azure AD and
Cost Management and Optimisation
Azure Policies, Management and Blueprints
Azure Security and
Let our expertise and experience accelerate your path to Cloud Governance with these established solution offerings.
Related Case Studies
Related Blog Posts
Recently I was approached by a customer regarding a challenge they wanted to solve. How to delegate administrative control of a few users within Azure Active Directory to some lower level administrators? This is a common problem experienced by teams as they move to cloud based directories – a flat structure doesn’t really allow for delegation on business rules. Enter Azure AD Administrative Units; A preview feature enabling delegation & organisation of your cloud directory. For Active Directory Administrators, this will be a quite familiar experience to Organisational Units & delegating permissions. Okta also has a similar functionality, albeit implemented differently.
Being of a highly complex nature, container orchestration platforms (such as Kubernetes) benefit from being packed into a managed service. A well-designed managed service eases the load on your DevOps team, while keeping things simplified and structured to encourage an optimised and robust environment. Azure Kubernetes Services (AKS) is one such managed service. However, while Microsoft has done what they can to simplify Kubernetes, there is still a lot to architect, build and configure to get this service ready for production. Fortunately, there are a range of supporting products available that can improve your overall experience with productionising AKS.
With a significant percentage of workers having now moved from inside the network perimeter to outside, remote workforce security has unsurprisingly become a hot topic. As a result, there are many articles and blog posts detailing the management and patching of devices, VPN split tunnelling and endpoint security.