Microsoft 365 Purview: Data Classification and Lifecycle Management

Today, data management and protection are of paramount importance. Organizations handle vast amounts of data daily, and they must ensure that the data is properly protected. managed.. Microsoft 365 Purview’s data management features allow data to be effectively protected and managed. In this blogpost we delve into how Microsoft 365 Purview’s data classifications (Sensitivity labels) […]
Microsoft 365 Tutorial Video – Part 1 – Defender for Endpoint

During spring 2025, Above IT will release a series of tutorial videos on Microsoft 365 technologies. In the first part of the tutorial series, Above IT ‘consigliere’ Lauri Haveri explores Defender for Endpoint technology – centralized endpoint security enabled by the Microsoft 365 environment. We will be releasing similar tutorial videos monthly – much to […]
Putting all your cybersecurity eggs in one basket?

Following the theme of the recently passed and egg-filled Easter, Above IT’s new ‘consigliere’ Matias Haapaniemi has blogged about Microsoft’s Defender endpoint protection and its history as a cybersecurity technology. Microsoft’s paid endpoint protection has a long and interesting history, which often remains unknown due to the product’s repeated rebranding. So, if you’re still wondering […]
Strengthen your organization’s brand reliability

Dear IT Manager, take action now. The marketing department and the information security officer will soon be working together on this matter. 😉 While this might not be entirely the case yet, there is a partial truth behind the provocative headline. BIMI (Brand Indicators for Message Identification) is the latest email security measure following DMARC, […]
Microsoft Entra Suite and User Identity Lifecycle

Microsoft Entra Suite and user identity lifecycle. Why should your IT management focus on these two aspects? In today’s digital age, managing identities and access within an organization is crucial for maintaining security and efficiency. Microsoft Entra Suite offers robust solutions for managing user identities and their access, ensuring that users have the correct permissions […]
Microsoft Global Secure Access

Microsoft’s SSE solution Global Secure Access was released last July. The product has generated a lot of interest, and it’s no wonder, as Zero Trust architecture, SASE, and SSE technologies have been attracting attention in organizations for quite some time. The ever-evolving security threats have also prompted IT administrations to seek solutions to improve their […]
You are secure only by updating!

You are secure only by updating. Intune device management provides the framework for centralized endpoint management, but who manages the applications? Lauri discusses this in his blog.
Above IT is the trusted partner of the City of Imatra’s IT administration.

The City of Imatra’s IT administration strengthens its services and expertise with the support of Above IT
.
Insight into Microsoft 365 Data Protection

Insight into Microsoft 365 Data Protection? The Microsoft 365 service offers excellent collaboration opportunities for both internal organizational use and interaction with external stakeholders. Sharing information and inviting guests has been made very easy, and knowledge work across organizational boundaries has become part of our daily lives. However, there is a flip side, and concerns […]
Secure connections in the cloud

Secure connections in the cloud – utopia or Cisco+ Secure Connect technology? Well, the latter. Cisco packaged its cloud-based technologies for secure network traffic into the Meraki portfolio, and I’ve had the privilege of exploring and testing them within the Meraki portfolio recently. In this context, Cisco talks about SASE technology (Secure Access Service Edge) […]



