Episodes

  • It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more!

    [01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.

    Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.

    [02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?

    Learn More about this topic by visiting these sites:

    Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference Strategies

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Episodes manquant?

    Cliquez ici pour raffraichir la page manuellement.

  • Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.

    Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.

    [02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure
  • System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business.

    Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager.  

    [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager
  • Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access.

    The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.

    Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.

    [06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks  [34:46] How can Microsoft help against email attacks?Learn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.

    Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.

    [00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network
  • The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.

    Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.

    [00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.

    Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.

    [04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.

    Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.

    [03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.

    [00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.

    Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.

    [1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?

    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.

    [1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?


    Learn more about  Microsoft Premier Support Services.

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier Support

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment.

    With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.

    Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.

    [0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment.

    With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.

    Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.

    [2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment.

    With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.

    Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers.  

    [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview    [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.

    Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.

    [1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about  Microsoft Premier Support Services.
    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.

    Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. 

    [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?

    “How to Build Your Own Holodeck at Home” --- click here!

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.

    Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.

    [1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10

    __________________________

    __________________________

    Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS

    __________________________

    Websites & Blogs:

    Microsoft Services Premier SupportMicrosoft Cybersecurity

    Videos:

    Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
  • Software Methodologies, process, patterns, platform, and devices are constantly evolving. Fast, agile, inexpensive, and massively scalable infrastructure, is improving operational efficiency and enabling faster-time-to-value across industries. However, many companies are finding that making their applications highly available, scalable and agile is still challenging.

    Join Lex Thomas and Razi Rais as they cover the Microservices landscape -  from what it is to how your organization and customers can benefit from it. They’ll discuss how Azure Container Service and Azure Service Fabric are two major services that provide easy options to deploy large scale microservices on Azure as well as show us how to build a simple fully functional microservice in a cross-platform manner. 

    [0:40] What is a Microservice and how can organizations benefit from them?[5:58] What are the basic principles of Microservices?[10:15] How are these principles implemented?[11:28] What hosting options are available in Azure for Microservices?[17:17] Let's chat about the Azure Service Fabric and Azure Container Service --- how does this fit into microservices?[27:45] DEMO: How to get started on Microservices on Azure

    Want to learn more about Microservices on Azure? Click here Join our workshop today!

    If you're interested in learning more about the products or solutions discussed in this episode, click on any of the below links for free, in-depth information:

    Websites & Blogs:

    Microsoft Services Premier Support

    __________________________

    Send your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
  • Blockchain is an emerging way for businesses, industries, and public organizations to almost instantaneously make and verify transactions — streamlining business processes, saving money, and reducing the potential for fraud.

    At its core, a blockchain is a data structure that’s used to create a digital transaction ledger that, instead of resting with a single provider, is shared among a distributed network of computers.

    Join Lex Thomas and Razi Rais as they break down some blockchain concepts and then show us how to develop a simple hello world style blockchain solution and deploy it using Azure Blockchain as a Service (BaaS).

    [0:57] What is Blockchain?[2:14] How is this different than a standard distributed database?[5:16] DEMO: Introduction and Overview of Blockchain in a Dev/Test lab on Azure[30:40] DEMO: Blockchain and .NETLearn more about Blockchain as a Service



    If you're interested in learning more about the products or solutions discussed in this episode, click on any of the below links for free, in-depth information:

    Websites & Blogs:

    Microsoft Services Premier SupportProject BletchleyDevTest Labs (Quick Deploy Blockchain)Azure Marketplace Blockchain OfferingsAzure Quickstart Templates

    Create your own Custom Private/Consortium Blockchain Network

    __________________________

    Send your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS