Senserva

Introducing the Applications Simulator engine

By |2022-03-06T19:25:55+00:00March 6, 2022|Categories: Azure Active Directory, Azure Aplications, Azure Applications Security, Azure Security, Azure Sentinel, Azure User Security, Cloud Security, Guest, Microsoft Sentinel, Misconfiguration, Security, Senserva, shavlik|Tags: , , , , |

Introduction Senserva is excited to announce the newest release of the Senserva engine which includes the ‘Applications Simulator’. The Applications Simulator focuses on all aspects of applications (app registrations) in [...]

Visualize User and App Access Connections in Azure | Cross post from Microsoft Sentinel Blog

By |2022-02-18T22:11:00+00:00February 18, 2022|Categories: Azure Active Directory, Azure Aplications, Azure Applications Security, Azure IAM, Azure Security, Azure Sentinel, Azure User Security, Cloud Security, Customers, Microsoft 365 IAM, Microsoft 365 Security, Microsoft Sentinel, Microsoft Sentinel Notebooks, News, Security, Senserva, Uncategorized|Tags: , , , , , , |

We just put out a guest blog on the Microsoft TechCommunity Sentinel Blog, be sure to check it out! Great Collaboration with the team there and more to come!

How Senserva can help to protect your organization from cyberattacks

By |2022-03-06T14:47:07+00:00September 15, 2021|Categories: Azure Active Directory, Azure IAM, Azure Security, Cloud Security, Customers, Microsoft 365 IAM, Microsoft 365 Security, Security, Senserva|Tags: , , , , , , , , , , , |

The pace and diversity of cyberattacks are on the rise. Recently, we have seen high-profile incidents of ransomware, including the recent Colonial Pipeline attack, and a new vector of attacks [...]

Cybersecurity Practices to Secure AAD – Continuous Access Evaluation

By |2021-06-09T21:47:58+00:00June 9, 2021|Categories: Azure Security, Cloud Security, Microsoft 365 Security, News, Security, SenservaPro|Tags: , , , , , |

Azure has many features to help secure your use of the cloud. Several methods like Multi-Factor Authentication are standard to any IT workload. Some are less well-known, such Continuous Access [...]

Go to Top