Posts
- 4 ways Azure Logic Apps improves Entra ID extensibility
- 5 privileged access management (PAM) best practices
- 5 simple ways you can help your users spot a phishing attack
- 5 things to look for in an IT provider
- 6 ways streamlined onboarding elevates employee experience
- 7 Business benefits of Entra ID that you need to know
- 7 ways your Microsoft 365 Enterprise licence saves time and money
- 8 data and analytics use cases which drive business value
- A day in the life of a Kocho Marketing Manager
- A day in the life of a Kocho Operations Manager
- A day in the life of a Technology Evangelist at Kocho
- A false sense of security: Is your managed service provider a ticking time bomb?
- A quick guide to Microsoft 365 E5 Security and Compliance add-ons
- Achieve identity security in 5 easy steps
- ADFS vs. Azure AD: How Microsoft has changed the authentication game
- Are you overspending on your mobile expenses?
- Are you still struggling with an “unmanaged mobile network” service?
- Are your mobile procurement savings hiding hidden costs?
- Authentication with Azure Active Directory
- Avoiding common pitfalls of mobile contract negotiations
- Azure AD B2B vs B2C: What are the key differences between Microsoft’s external access products?
- Better together – How flexibility is at the heart of Kocho’s people strategy
- Better together: Why Unified Endpoint Management needs Mobile Threat Defence
- Building a data and analytics roadmap which delivers business value
- CIAM migration: Azure AD B2C to Entra External ID for Customers
- Cloud computing and compliance for the financial sector
- Cloud migration checklist: 10 steps to deliver a successful project (+ infographic)
- Cloud transformation vs. cloud migration: What’s the difference?
- Cyber security trends for 2024
- Data sovereignty and the cloud key management problem
- Data warehouse Q&A with Mitesh Desai
- Decentralised identity: A beginner’s guide
- Ditch data overload: Why clarity matters in cyber security reports
- Does Wi-Fi need AI?
- Enabling the ‘flexible normal’: The secret formula to future-proof your productivity
- Entra External ID is Microsoft’s latest CIAM solution. But is it ready to replace Azure AD B2C?
- Entra ID vs Okta: Choosing the right cloud-identity solution
- Everything you need to know about Microsoft Zero Trust Security
- For CIAM to succeed, experience and security is a must
- Get your business prepared for new cyber security regulations
- Gone Phishing: Don’t get suckered into social engineering scams
- Hidden threats: The cyber security blind spots putting your business at risk
- How and why to move to Azure Information Protection (AIP) unified labeling
- How cyber criminals used phishing to exploit the CrowdStrike outage
- How does CAF 3.2 impact identity strategies in critical national infrastructure?
- How the SolarWinds breach highlights the dangers of federated authentication – and what you can do to protect against it
- How to automate user provisioning from any HR system
- How to build a strong culture with a remote team: Tips and techniques to keep staff engaged and happy
- How to create a resilient work from anywhere strategy
- How to maximise value with Azure infrastructure
- How to stop threat actors weaponising legitimate apps like eM Client
- How to strengthen SME cyber resilience with managed security
- How well is your MSP keeping control of cloud spending?
- HR driven provisioning: How to perfect the JML process with Entra ID
- Identify, analyse and remediate: What is Microsoft Defender XDR?
- Identity Governance: Your pathway to ISO certification excellence
- Improving identity lifecycle management with lifecycle workflows
- Is it time to leave your security operations to the experts?
- Is Microsoft Sentinel any good?
- Microsoft 365 licensing: E3 vs. E5 – Which is right for you?
- Microsoft Defender for Office 365 vs Mimecast – Evaluate and migrate
- Microsoft disabling Basic authentication in October 2022 – What to know and how to be ready
- Microsoft Entra Suite aligns identity protection and network security
- Microsoft Intune: Unlock the benefits of your BYOD strategy
- Microsoft make MFA mandatory in Azure: User implications and actions
- Microsoft Sentinel vs. Splunk: Which is better?
- Microsoft XDR: Simplifying SecOps and securing your estate
- MiFID II Q&A with Jacques Fourie
- Moving apps into the cloud: Planning your migration strategy
- People power: What is technology adoption and change management?
- Phishing attack prevention: A scenario-based guide
- Practice safe CX with customer identity management
- Prevent malicious mailbox rules in business email compromise
- SD-WAN Q&A with Jacques Fourie
- Securing Endpoints: Tackling the challenges of a hybrid work environment
- Securing your path to passwordless authentication: A quick guide to modern sign-on methods
- Security under siege: Why ransomware remains a major threat to your business
- Serverless computing Q&A with Mitesh Desai
- Smart phone strategy? Take control of your company mobile budget
- Ten key questions to ask about cloud key management solutions
- The 5 pillars of a secure cloud transformation
- The AI phishing threat: Don’t get reeled in
- The AI-Factor: How Generative AI could transform your security operations
- The Azure AD Application Proxy: What it is, what it can do, and how it can help you…
- The benefits of adopting a digital collaboration culture with Microsoft Teams
- The definitive guide to Azure AD: Everything you need to know
- The expert’s guide to improving identity and access security
- The key to SOCcess – 5 things you need to consider for improved threat monitoring and response
- The new world of endpoint resilience
- Third-party access management: Why you need to care about collaborator controls
- Top 4 managed security services benefits – It’s not all about the money
- Top 5 cloud migration benefits for your data
- Unified XDR and SIEM: Cutting costs not corners in your cyber security
- What is a security operations centre (SOC)?
- What is cloud transformation?
- What is FinOps and how is it transforming cloud computing?
- What is Managed SIEM? Everything you need to know
- What is Microsoft Azure AD B2B?
- What is Microsoft Azure AD B2C?
- What is Microsoft Defender for Endpoint?
- What is Microsoft Entra ID?
- What is Microsoft Entra Identity Governance?
- What is Microsoft Entra Permissions Management?
- What is Microsoft Entra?
- What is Microsoft External Identity for Customers?
- What is Microsoft Global Secure Access?
- What is Microsoft Identity Manager (MIM)? Everything you need to know
- What is Microsoft Intune?
- What is Microsoft modern management – and how can it help you overcome your MDM challenges?
- What is Microsoft Sentinel? Everything you need to know to get started with Microsoft’s cloud SIEM
- What is SCIM and how do I make the magic happen?
- What is Verified ID? Online identity verification made easy
- Why is mobile data usage growing?
- Why MFA should be at the heart of your zero trust strategy
- Why Microsoft Intune leads the way in unified endpoint management
- Why you need to choose an identity-centric security partner
- Will Microsoft’s Security Service Edge (SSE) revolutionise access security?
Page
- About
- Accreditations & Awards
- Ask Question
- Blog
- Careers
- Contact Us
- Cookie Policy
- Do more with less [Microsoft infographic]
- Events & Webinars
- Exclusive Business Leaders Dinner – Tackling the new Wild West of AI
- Feedback
- Feedback and complaints policy
- Free F1 Drive Experience – Exclusive Legal Sector Event
- Gender Pay Gap Report 2024
- Glossary
- Home
- How to add Kocho to your email client’s safe senders’ list
- Industries
- Is your business cyber safe? Find out with a Security Posture Assessment
- Master Services Agreement
- Microsoft Funded Security and Compliance Engagements
- Microsoft Summit 2022 Evening Entertainment
- Microsoft Summit 2024 Location
- Microsoft Summit Speakers
- Microsoft Technology Summit 2024
- Microsoft VIEW 2024 – Registration
- Mobliciti joins Kocho Group: One brand providing comprehensive digital security solutions
- Modern Slavery
- Partners
- People
- Privacy Policy
- Recruitment Privacy Policy
- Resources
- Services
- Sitemap
- Solutions
- Story
- Summit 2024 Agenda
- Summit 2024 Registration
- Sustainability Statement
- Technologies
- Terms & Conditions
- Testimonials
- ThirdSpace has a new identity. Say hello to Kocho
- Tig Data Intelligence has rebranded to Kocho
- VIEW 2023 – Resources On-demand, Ungated (Attendees)
- VIEW 2024 – Speakers
- VIEW 2024 – Venue
- VIEW 2024 Agenda
- What is CIAM?
People
- Alastair Rees
- Alison Werkman
- Andy Brown
- Anna Webb
- David Guest
- Des Lekerman
- George Georgiou
- Ingrid Jack
- Jack Fisher
- Jacques Fourie
- Marcus Idle
- Mark Howling
- Mark Warnes
- Martyn Gill
- Mathew Richards
- Mitesh Desai
- Nichola Rees
- Nigel Lambourn
- Paul Rouse
- Perry Dowell
- Ricardo Canovi
- Shane Taylor
- Steven Connelly
- Tom Urwin
- Tom Waller
- Tony Simmonds
Services
- Azure Optimisation Manager
- Business Transformation Services
- ClearVue™ SecOps reporting dashboard
- Compliance Management Services
- Consultancy Services
- Managed Extended Detection and Response (XDR)
- Managed IT Support Services
- Managed Mobile Services
- Managed Sentinel
- Merger & Acquisition IT Integration
- Microsoft 365 Optimisation Manager
- Microsoft solution support
- Mobile Optimisation Manager
- XDR Rapid Protect: Managed Security Services
Industries
Technologies
- Azure AD
- Azure AD External Identities
- Azure AD Identity Governance
- Azure AD Identity Protection
- Azure Analysis Services
- Azure Data Lake
- Microsoft Azure Synapse Analytics
- Microsoft Defender for Cloud
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Endpoint
- Microsoft Defender for Office 365
- Microsoft Identity Manager (MIM)
- Microsoft Power BI
- Microsoft Purview Data Loss Prevention
- Microsoft Purview Information Protection
- Microsoft Teams
- YubiKey
News
- A tribute to Mathew Rawlings, our friend and colleague
- Award-winning Anna Webb: Cyber security changemaker
- Better Together: Kocho and Mobliciti unite to provide comprehensive digital solutions
- Celebrating a win at the Cloud Excellence Awards with IXICO
- Celebrating the Kocho women shaping the tech of tomorrow
- Enterprise mobility specialist, Mobliciti, joins the Kocho group in new acquisition
- Five insights gained from the Entra Airlift Conference
- Hello, Kocho – ThirdSpace and TiG rebrand and unveil new strategy for growth
- Identity Change: Microsoft rename Azure AD and introduce Security Service Edge (SSE)
- IT leaders: VIEW is back and this is why you need to be there
- Kocho achieves Microsoft Modernise Endpoints Specialisation
- Kocho achieves Microsoft verified MXDR solution status
- Kocho achieves worldwide ranking on prestigious list of managed service providers
- Kocho announced as 2022 Microsoft Partner of The Year Awards finalist
- Kocho appoints new Director of Managed Services, Jon Blagg, to accelerate service development and growth
- Kocho attains Microsoft Advanced Specialisation in Cloud Security
- Kocho cements status as one of Microsoft’s top UK partners for identity, cloud, and security
- Kocho expertise recognised with new Microsoft Gold Security accreditation
- Kocho is expanding its operations into South Africa
- Kocho make the CyberTech100 list of the world’s most innovative companies within financial services
- Kocho named among Top 25 managed service providers in EMEA
- Kocho named in world’s top 5 managed service providers for financial services
- Kocho partners with Hoxhunt to revolutionise cyber security training and risk management
- Kocho raise £1,500 for St David’s Hospice with 3 Peaks walk in Wales
- Kocho recognised as a 2020 Microsoft Partner of the Year Finalist for Security and Compliance
- Kocho recognised as a great place to work by Investors in People
- Kocho selected to join the Microsoft Intelligent Security Association (MISA)
- Kocho shortlisted in the ‘Best Microsoft Partner to Work For’ category at the Digital Revolution Awards
- Kocho supports ‘life-changing’ tech hub in South Africa
- Kocho unveils Managed XDR service, empowering clients to detect and respond to complex cyber threats
- Kocho wins ‘Security Specialist Reseller’ at the 2023 PCR Awards
- Kocho wins prestigious 50 Best Managed IT Companies Award
- Kocho wins Security Project of the Year at the Computing Security Excellence Awards
- Kocho’s Head of Security, Anna Webb, champions CyberFirst initiative as ambassador
- Microsoft announce price changes from April 2023
- Microsoft Copilot available for all – our tips for practical deployment
- Microsoft’s external identity offering is evolving: What you need to know about the changes to Azure AD B2C
- Moving on up: New offices for Kocho South Africa following rapid growth
- New research shows overconfidence in MSP security is putting UK firms at risk
- On the road again: Microsoft Identity Roadshow comes to London
- Opening the doors at Kocho’s new Cardiff office
- Perry Dowell appointed Kocho’s New Chief Financial Officer
- Shortlisted for Best Security Company of the Year 2022
- Summit Great Happened: Key moments from the Microsoft Identity, Security, and Compliance Summit
- The Microsoft Cloud Partner Program: How Microsoft and Kocho are evolving to meet the needs of modern organisations
- Tony Simmonds Appointed to lead Kocho’s Business Transformation Practice
Case Studies
- A clean bill of health: Workday SaaS HR solution deployed at international healthcare group
- A free-flowing and secure customer experience for a national water company
- BGF scales up with Azure Cloud and Microsoft 365 to underpin digital transformation
- Bird and Bird roams free with mobile airtime
- Building a secure multi-brand authentication experience at BT
- Cloud transformation provides platform for growth at Europa
- Constructing a mobile future: A device solution for a UK construction company
- Creating a comprehensive cloud-based threat detection service for a global insurer
- Delivering managed SOC flexibility for Viking
- Enabling seamless access and secure device management for a leading recruitment firm
- Engineering a new culture of data protection and governance for a world-leading professional services provider
- Financial services juggernaut overhauls records management system and strengthens its compliance posture
- Fully comprehensive: Using Azure AD B2C to deliver a seamless and secure customer experience for a leading UK insurer
- Global accountancy giants unify their systems and communication platforms with Microsoft Exchange Server
- Global insurer builds foundations for digital transformation with Azure AD Connect
- Governing access and securing data for a leading chip manufacturer
- Hallo Healthcare Group: A seamless cloud migration and security infrastructure overhaul
- Identity management made smooth and easy at Staffordshire University
- Insurance company builds secure and compliant customer login experiences with Azure AD B2C
- Insurance industry challenger secures access and establishes a platform for growth using Microsoft Azure
- Integrating FIDO2 with Azure AD B2C: Secure customer authentication made simple
- Large UK insurer improves endpoint security and compliance
- Managed IT support helps US-based global investment firm to grow
- Managed mobile services for Fidelity International
- Managing mobile devices with Intune at Sir George Monoux College
- Microsoft security suite pays dividends for a UK asset management company’s security posture
- No smoke without single sign-on: International retail business improves UX with Azure AD B2C
- Osborne Clarke strengthens connection resilience
- Pole position: Sports media company achieves unmatched security, access, and collaboration with Microsoft 365
- Providing secure and hassle-free membership experiences at the IET
- Quick turnaround: Print services provider embraces cloud storage to sustain success
- Refreshing RPC’s mobile fleet with Managed Mobile Services
- Refreshing the Macfarlanes fleet during national lockdown
- Retail giant goes shopping for enterprise mobility: Identity management at the heart of connecting people and systems
- Retail giant McArthurGlen goes all-in on Microsoft 365 to drive growth, agility, and security
- Seamless, secure customer access for large UK electricity provider
- Security health checks unlock global collaboration
- Taking the University of the West of England securely into the Cloud
- Transforming a leading medical imaging service provider with Microsoft Cloud
- Try before you buy: Road-testing Microsoft Sentinel for a local housing association
- Validating a leading healthcare provider’s security posture
- When communication is a matter of life or death: A mobile device solution for a city ambulance service
E-Guides
- 6 ways to guarantee successful technology adoption
- Act Now! Or Pay Later: 5 cyber security issues you can’t afford to ignore
- Choosing your managed security services partner (MSSP)
- Exclusive Report – Security risks in the digital supply chain
- How Copilot works with the Microsoft Security stack
- How technology creates the competitive edge in private equity
- In-house vs. outsourced security operations: Which is right for you?
- Is Microsoft Entra ID ready to replace MIM?
- Phishing and Cyber Behaviour Trends
- Revealed: How to save 30% on device management
- Supercharge your security operations with SIEM and XDR
- The Complete Guide to Microsoft Entra [New for 2024]
- The Complete Guide to Microsoft Sentinel and Defender XDR
- The data-driven SME
- The ultimate guide to external identity success
- The Ultimate Guide to Microsoft Security [New for 2024]
Events
- Acing External Identity Management Workshop
- Copilot for Microsoft 365: Secure Deployment Roundtable
- Customer Experience: Improve secure external authentication
- Device Lifecycle Workshop with Microsoft Intune Suite Demo
- Dinner and discussion with Microsoft’s CTO for Private Equity
- Driving Faster Networks – and a Virtual F1 Car
- Endpoint Management Masterclass: Achieving productivity and security
- Hack the Hackers: Cyber Attack Stories and Solutions
- Identity and Device Protection Masterclass
- Legal Breakfast Briefing: Modernising The SOC with Microsoft Sentinel
- Managing Identities and Securing Access – Roundtable
- Microsoft 365 E5 Adoption and ROI: Virtual Workshop
- Microsoft 365 E5 deployment best practice workshop **FULLY BOOKED**
- Microsoft Defender XDR Workshop
- Microsoft Entra Verified ID Demo Workshop
- Microsoft Identity Roadshow 2024
- Microsoft Identity, Security, and Compliance Summit 2022
- Microsoft Masterclass: Integrated SIEM and XDR
- Microsoft Purview Masterclass: Protecting Sensitive Data
- Microsoft Security and Compliance Roadshow – Edinburgh
- Microsoft Security and Compliance Roadshow – Manchester
- Microsoft Security Masterclass: Protect your multi-cloud investment
- Microsoft Security Roadshow 2024
- Microsoft Technology Summit
- Microsoft VIEW 2024: Security, Identity and Endpoint Thought Leadership
- Navigating CAF 3.2 regulations with Microsoft Entra and Zero Trust
- Peer-to-Peer Lunch: Security and Compliance in Law Firms
- Protecting Professional Services in the Modern Attack Landscape
- Supercharge your SecOps: Virtual Workshop
- Virtual Breakfast Briefing: Building a frictionless customer login experience
- Visibility and control: How to solve your multi-cloud security headaches
- Workshop: Microsoft Entra Explained
Webinars
- A guide to deploying passwordless authentication
- BCVA: How cyber security resilience can grow and protect portfolio ROI
- Become king of your cloud transformation castle
- Enable secure collaboration and document sharing
- How to quickly and securely transform to the Cloud
- How to simplify access, reduce risk and stay compliant in the new era of work
- How to simplify airtime management AND save money
- Identity and zero trust for the new hybrid world
- Identity Masterclass – Integrating HR Systems with your IDM System
- Maximising ROI from your Microsoft 365 E5
- Microsoft 365 Copilot: Demo and deployment advice
- Microsoft Defender for Cloud Apps Demo
- Microsoft Defender for Cloud Demo
- Microsoft Defender XDR Demo: Simplifying SecOps
- Microsoft Entra Suite: Enable Seamless User Lifecycles
- Microsoft Intune Suite Demo: Deliver Unified Endpoint Management
- Microsoft Purview: Enable compliance and enhance Copilot for Microsoft 365 adoption
- Microsoft security tools to protect financial and professional services in the remote working world
- Microsoft Sentinel and Defender XDR Demo: Powering unified security operations
- Microsoft Technology Summit
- Microsoft’s Identity and Entra roadmap for 2024
- Microsoft’s Security Service Edge (SSE) Demo: Achieve global secure access
- Phishing Hacks: Empower your people to resist the bait
- Remote working is here to stay: How to achieve productivity and security with Microsoft modern management
- Security trends forecast for 2024 and Microsoft’s response
- The best Microsoft compliance tools that you have never heard of!
- The future of Microsoft’s cloud identity strategy
- The power of data and business intelligence
- The secrets to simple and efficient mobile management
- Understanding and enabling decentralised identity – Microsoft Expert Webinar
- Understanding Microsoft’s information protection and compliance tools
- VIEW 2023
- Who are you? How to implement simple trustworthy identity verification
- Why migrate from ADFS to Azure authentication?