Security

A mouse logo with an arrow pointing below indicating that it is draggable downwards.
A Slash
  • A-CX Entra PA POC

    Entra Private Access PoC – Case Study

    Explore the journey of A-CX, a boutique consultancy, as they partnered with Microsoft to develop a groundbreaking Entra PA Proof of Concept in early 2024. This collaboration, conducted with Microsoft’s R&D team during Entra PA’s pre-GA phase, highlights innovative solutions and real-world challenges. Gain exclusive insights, best practices, and expert guidance on implementing Entra PA. This session offers practical learnings from the project, preparing you to leverage Entra PA’s potential in your organization. Register now to connect with industry experts and stay ahead with future-ready knowledge.

  • Microsoft Global Secure Access, a VPN Killer

    Microsoft Global Secure Access, a VPN Killer

    Discover how Microsoft Entra replaces legacy VPNs with Zero Trust, offering scalable, identity-first protection for today’s mobile workforce.

  • Futuristic digital landscape symbolizing Azure Entra Private Access and cloud security, featuring technology structures and secure network connections in shades of blue and silver.

    Securing Your Cloud: The Guide to Entra Private Access

    Explore the comprehensive guide to Azure Entra Private Access. Learn how it enhances cloud security, its key features, best practices, and real-world applications across various industries.

  • AI and Cybersecurity webinar

    AI and cybersecurity

    The “AI and cybersecurity” webinar is our fifth in the “Approachable AI” series. These webinars aim at decision-makers who approach AI from customer, product, and business perspectives. AI is technical, but we see technology as an enabler, not the primary purpose.

  • Energy sector

    The energy sector’s increasing security needs

    The energy sector’s security needs are increasing. The sector has morphed from a for-granted commodity to a hotbed of politics and our daily lives. A-CX helps build secure and customer-friendly IT systems for the energy industry.

  • Securing network

    Using Certificates For More Than Encryption

    Encryption is everywhere, and by extension certificates. In distributed architectures certificates can provide a lot more than just encryption, preventing spoofing and performing authorization to help prevent internal attacks.

  • TrustNoOne

    Zero-Trust Authentication: What It Is and Why It Matters

    As the nature of online services changes Zero Trust Authentication represents the natural evolution of security practices in online environments. It is becoming more important then ever to secure services against internal attack