Deliver Java Apps Quickly using Custom Connectors in Power Apps

This article is contributed. See the original author and article here.

Overview  


In 2021, each month we will be releasing a monthly blog covering the webinar of the month for the Low-code application development (LCAD) on Azure solution. LCAD on Azure is a new solution to demonstrate the robust development capabilities of integrating low-code Microsoft Power Apps and the Azure products you may be familiar with.    


This month’s webinar is ‘Deliver Java Apps Quickly using Custom Connectors in Power Apps’ In this blog I will briefly recap Low-code application development on Azure, how the app was built with Java on Azure, app deployment, and building the app’s front end and UI with Power Apps. 


What is Low-code application development on Azure?   


Low-code application development (LCAD) on Azure was created to help developers build business applications faster with less code, leveraging the Power Platform, and more specifically Power Apps, yet helping them scale and extend their Power Apps with Azure services.    


For example, a pro developer who works for a manufacturing company would need to build a line-of-business (LOB) application to help warehouse employees’ track incoming inventory. That application would take months to build, test, and deploy, however with Power Apps’ it can take hours to build, saving time and resources.   


 However, say the warehouse employees want the application to place procurement orders for additional inventory automatically when current inventory hits a determined low. In the past that would require another heavy lift by the development team to rework their previous application iteration. Due to the integration of Power Apps and Azure a professional developer can build an API in Visual Studio (VS) Code, publish it to their Azure portal, and export the API to Power Apps integrating it into their application as a custom connector. Afterwards, that same API is re-usable indefinitely in the Power Apps’ studio, for future use with other applications, saving the company and developers more time and resources. To learn more, visit the LCAD on Azure pageand to walk through the aforementioned scenario try the LCAD on Azure guided tour. 


Java on Azure Code 


In this webinar the sample application will be a Spring Boot application, or a Spring application on Azure, that is generated using JHipster and will deploy the app with Azure App service. The app’s purpose is to catalog products, product descriptions, ratings and image links, in a monolithic app. To learn how to build serverless PowerApps, please refer to last month’s Serverless Low-code application development on Azure blog for details. During the development of the API Sandra used H2SQL and in production she used MySQL. She then adds descriptions, ratings, and image links to the API in a JDS studio. Lastly, she applies the API to her GitHub repository prior to deploying to Azure App service.  


Deploying the Sample App 


Sandra leverages the Maven plug-in in JHipster to deploy the app to Azure App service. After providing an Azure resource group name due to her choice of ‘split and deploy’ in GitHub Actions she only manually deploys once, and any new Git push from her master branch will be automatically deployed. Once the app is successfully deployed it is available at myhispter.azurewebsites.net/V2APIdocs, where she copies the Swagger API file into a JSON, which will be imported into Power Apps as a custom connector. 


Front-end Development 


The goal of the front-end development is to build a user interface that end users will be satisfied with, to do so the JSON must be brought into Power Apps as a custom connector so end users can access the API. The first step is clearly to import the open API into Power Apps, note that much of this process has been streamlined via the tight integration of Azure API management with Power Apps. To learn more about this tighter integration watch a demo on integrating APIs via API management into Power Apps.  


After importing the API, you must create a custom connector, and connect that custom connector with the Open API the backend developer built. After creating the custom connector Dawid used Power Apps logic formula language to collect data into a dataset, creating gallery display via the collected data. Lastly, Dawid will show you the data in a finalized application and walk you through the process of sharing the app with a colleague or making them a co-owner. Lastly, once the app is shared, Dawid walks you through testing the app and soliciting user feedback via the app. 


Conclusion 


To conclude, professional developers can rapidly build the back and front ends of the application using Java, or any programming language with Power Apps. Fusion development teams, professional developers and citizen developers, can collaborate on apps together, reducing much of the lift for professional developers. Please watch the webinar and complete the survey so, we can improve these blogs and webinars in the future. 


Resources 



  • Webinar 




  • Low-code application development on Azure  




  • Java on Azure resources  





  • Power Apps resources 



Microsoft Teams Community Update February 2021

This article is contributed. See the original author and article here.

It is hard to believe it is just one year since all of us around the world began staying at home due to COVID-19 and though it’s been quite the challenge, it’s taught us how important it is to lean on each other. Through all the bad…the isolation, an overload of work, concern for loved ones, fear of the unknown, and wondering if life will ever get back to normal, there have been some silver linings. I’ve heard great stories of people around the community starting podcasts with one another without ever meeting in person, individuals digging into the Microsoft Technical Community to interact with others during down time, and event organizers opening their virtual doors to the world allowing for global audiences and speakers to interact with one another. Thank you for allowing Microsoft Teams to be a big part of your life the past year. We are looking forward to a brighter year ahead and excited for the innovation yet to come.

We had an exciting Ignite week last week and in case you missed it, some of our MVPs recapped the following Microsoft Teams sessions. Have a read:



  1. Microsoft Ignite Live Blog: FS189 – Easy, intuitive webinars with Microsoft Teams

  2. Microsoft Ignite Live Blog: FS191 – Secure and Compliant Collaboration with Microsoft Teams

  3. Microsoft Ignite Live Blog: FS192, OD380, OD378 – Latest Innovations in Teams Calling and Meetings

  4. Microsoft Ignite Live Blog: KEY06 – The Hybrid Workplace


If you are interested in sharing your knowledge, experience, or story with community, we’d love to hear from you. We invite all community members to participate in the Microsoft Teams Community Blog Space aka.ms/teamscommunityblog; submit your blog idea at aka.ms/teamscommunityblogger.


 


As announced last month, Microsoft Teams Engineering would like to recognize community members who make significant contributions to improving the product and sharing their knowledge with community by presenting the Microsoft Teams Community Star Award; I am excited to share the community member we’d like to recognize for February 2021. It’s not a surprise the Microsoft Teams space in the Tech Community has seen significant growth over the past year given the increase in use. With that increase comes a need for community members to participate by sharing tips and tricks, experiences, and answering questions of others. Every month since May 2020, Christian Jernqvist Bergström, an M365 and Teams specialist in Sweden, has been one of the top 5 contributors to the discussion board (in February 2021 he was number one!) and has replied to a total of 2131 posts since becoming a member in February 2020. With a new baby at home, it’s a miracle Christian had time to tend to others and it’s a true testament to his love for community. Thank you, Christian Bergström, for your commitment to Microsoft Teams, for your passion of the product, but mostly – thank you for your love of helping others. You are a true Community Star! (Anyone can nominate an individual for the Microsoft Teams Community Star Award – MVPs are not eligible).


 


The thought of getting together is exciting and it seems like there is a light at the end of the tunnel with many community events confirming in-person event dates. I’d like to share a few of the events we’re looking forward to. For a full list, please visit: aka.ms/CommunityEvents. If you have your own user group or community event, be sure your event is listed in the Tech Community.

We celebrated International Women’s Day on March 8th and the Women in Teams Community hosted the second monthly gathering on the 9th. All women and allies are invited to participate in monthly gatherings with Microsoft and Community speakers and regular discussions in Microsoft Teams. This month, we welcomed @Sandya Rao, Principal Group Product Manager for Personal and Small Room Devices for Microsoft Teams, and Community Members and allies Peter Rising and David Patrick. To join, please sign-up at aka.ms/WomenInTeams. All are welcome.

On behalf of the Microsoft Teams Engineering Team, we wish you health, happiness, and a Happy March. We love seeing you on camera but we’re very much looking forward to seeing you in person soon.

Stay well,
Laurie

2021 Imagine Cup category feature: Education

2021 Imagine Cup category feature: Education

This article is contributed. See the original author and article here.

Meet the students working to transform education with Augmented Reality, Artificial Intelligence, chatbots, and more!


 


The 2021 Imagine Cup is all about innovating to help solve pressing global issues, and this year’s competition is focused on solutions in four social good categories: Earth, Education, Healthcare, and Lifestyle. All tech ideas submitted to the competition were developed under one category that best aligned with a team’s passion and motivation to make a difference. In this feature, we’ll look at innovations for Education. 


 


Education overview 


The Education category focuses on innovating to change the way students across the globe learn. This encompasses empowering every student on the planet to achieve more, and encouraging lifelong learning, employability, and equal opportunity through tech. Our Education category finalists have developed solutions to support global students, which include a community-driven resource catalog, Augmented Reality support for individuals with learning disabilities, and low-cost remote learning facilitation. 


 


Why it matters 


Education influences all our lives and leads to empowerment, opportunity, and developing new skills and technologies the world needs. This field also faces many challenges, including unequal access to education and learning resources, availability of teaching support, and educator tools for effectively teaching new skills.  


 


Our Earth category World Finalists have created projects to empower learners and educators, increase access to learning, and support global students finding their paths to make their own impact.  


 


Meet our Education category World Finalists: 


 






































Team Agent of Change, Japan


Project: Ujiyan


 


Ujiyan is a lightweight platform-agnostic chatbot to conduct school assessments. Teachers can publish multiple choices questions using the team’s web app and students can access the test via messenger apps. The goal is to make remote learning more accessible for every student.


Agent of Change Logo.png

Team Cafrilearn, Kenya


Project: Makini


 


The team’s project consists of a mobile application that supports their device, which allows facilitation of digital learning at an affordable cost to low income families and marginalized communities.


Cafrilearn.PNG

Team Hands-On Labs, United States


Project: Hands-On Labs – How can we enable every student to have a truly ‘hands-on’ learning experience’ online?


 


Hands-On Labs is a set of remote laboratories that allows students to observe and remotely control physical tools online in real-time for their courses. The team aims to provide an active learning experience to students from any background all around the world.


Hands-On Labs.jpg

Team JAN/A, Czech Republic


Project: KnowledgePicker


 


KnowledgePicker is a community-driven catalog of learning resources organized into network of topics. The project aims to gather links to learning resources and collect ratings and reviews from real learners to determine the best resources. 


JANA.png

Team Myotics, Canada


Project: Myo Code


 


Myo Code helps students learn to code complex apps without the challenges of learning a new language. The team developed an AI natural language processing system that enables beginners in computer science to begin coding in their own native language. The goal is to create a zero-barrier entry point into the field of programming for all students.


Myotics.png

Team Nyansapo AI, United States


Project: Digital Literacy Assessment


 


The team’s mobile app enables instructors to assess the literacy level of multiple children at once and track the individual literacy progress of children over time. As a digital assessment tool, the projects makes it easy for instructors to collect, organize, and analyze assessment data to effectively place students in the best educational level.


Nyansapo AI Logo.jpg


Team QueryCity, Pakistan


Project: QueryCity


 


QueryCity aims to make education accessible for all with its efficient Student’s Search Engine, which features thousands of questions and answers to all subjects. The solution hopes to help students save money on textbooks and other resources. 


QueryCity.png

Team Tandemly, United States


Project: Tandemly


 


Using an array of built-in services and Augmented Reality, Tandemly aims to enhance and transform the educational experience for individuals with learning disabilities.


placeholder.jpg

 


We’re so inspired by these students’ passion to make a difference and are excited to see them pitch their projects at the World Finals this month. Four winning teams will be selected from each of the competition categories, taking home USD10,000 and Azure credits. These teams will also move forward to the World Championship for the chance to win USD75,000 and mentorship with Microsoft CEO, Satya Nadella. Two runner-up teams in each category will take home USD2,500 plus Azure credits.


 


Follow the action 


Follow these teams’ journey on Instagram and Twitter as they head to the World Finals to compete.  

Secure Access for applications with Microsoft Cloud App Security

Secure Access for applications with Microsoft Cloud App Security

This article is contributed. See the original author and article here.

Authored with Anisha Gupta, Product Manager, Microsoft Cloud App Security 


 


Digital transformation has been accelerated by remote workThe result is that many of our toughest security challenges have risen to the surface. Our traditional perimeter-based network and security models can’t adapt as quickly to this massive, fast shiftMany organizations are struggling to support permanent hybrid work models. For them, establishing secure access outside the corporate network is critical and remains elusive. As employees transition to these work models, they’re unintentionally bringing new risks and threats—for example, when accessing corporate resources from personal and unmanaged devices. It’s a challenging landscape that security teams are expected to manage.  


 


In 2020, the Microsoft Threat Intelligence Center reported a 230% increase in password spray attacks alone, and observed over 5 billion attacker-driven sign-ins. As our cloud services evolve, threats also evolve. It’s clear that a new approach to security is required. Thankfully, security admins can leverage secure access in Microsoft Cloud App Security to remediate against this increasing threat landscape.  
 


Your cloud access security broker (CASB) should provide secure, easy and adaptive access to your organization’s apps depending on factors like location, device and user behaviorAdaptive access affirms the security measures your organization has put into place. This brief two-minute video demonstrates the flexibility of secure access in Microsoft Cloud App Security: 


In this blog post, we will summarize Conditional Access App Control and celebrate an exciting new capability which provides continuous adaptive access.


 


Background: Conditional Access App Control in Microsoft Cloud App Security 


Microsoft Cloud App Security enables admins to enforce real-time monitoring and controls on actions performed within a session. These controls can be configured through either a single checkbox integration with Azure AD Conditional Access or a quick set-up wizard with 3rd party identity providers. Based on access conditionslike the identity sourcethe device being usedor the risk level of the user, the user actions can be explicitly allowed or blocked. 


 


Adaptive Access: step-up authentication  


Today, we’re excited to introduce a powerful new administrative controlpolicy action for in-session step-up authentication. The announcement of this feature shifts the paradigm from only enforcing security checks at the entrance to a session, to the adaptive enforcement of those same conditions in the sessionIn partnering with Azure AD, Microsoft Cloud App Security has enabled admins to configure Conditional Access authentication context and apply it to in-session activities. In-session actions, like the download of sensitive information, can now be required to pass through an additional security check, such as an MFA challenge or device compliance check, before a user can access data. 


 


This feature re-evaluates Azure AD Conditional Access policies in real-time when a sensitive action is performed, to mitigate the risk of changing conditions and risk In this screenshot, we can see how the new feature is expressed as a secondary security check, required as the user attempts to download a PDF from 3rd party app on an unmanaged device: 


SecureAccess-1.png


After the security check is complete, the user receives an on-screen result of the check: 


SecureAccess-2.png


 


What to do next 


We invite you to take these scenarios and adapt them to your organizational needs. This grants visibility into your cloud environment for all your apps. For onboarded and sanctioned apps, the Cloud App Security team recommends that admins apply access and session controls.  Leveraging advanced scenarios like access and session controls, Azure AD User Risk or in-session step-up authentication, in accordance with your organization’s environment security goals, is the next step toward a secure posture management of sessions. For unsanctioned apps, the recommended first step is to block the application at the endpoint with a policy, or utilize the Microsoft Cloud App Security Endpoint CASB tools. In either scenario, the two layers of cloud and identity determine the best way to deploy secure adaptive access in your environment 


 


Organizations can easily, flexibly block any app from access by the end user. Users can effectively use their time, unencumbered by security and compliance concerns because they are already being protected by adaptive access scenariosAn integrated set of solutions from Microsoft work in concert across your security stack. 


 


For further training or information, view Anisha’s twenty-minute discussion on secure access in Microsoft Cloud App Security: 


 


 


Feedback 


We welcome your feedback or relevant use cases and requirements for this pillar of Cloud App Security by emailing CASFeedback@microsoft.com and mention Secure Access. 


 


Learn more 


For further information on how your organization can benefit from Microsoft Cloud App Security, connect with us at the links below: 

























Join the conversation on Tech Community 


Stay up to date—subscribe to our blog.  



Upload a log file from your network firewall or enable logging via Microsoft Defender for Endpoint to discover Shadow IT in your network. 



Learn more—download Top 20 use cases for CASB. 



Connect your cloud apps to detect suspicious user activity and exposed sensitive data. 



Search documentation on Microsoft Cloud App Security 



Enable out-of-the-box anomaly detection policies and start detecting cloud threats in your environment. 



Understand your licensing options .  



Continue with more advanced use cases across information protection, compliance, and more. 



Follow the Microsoft Cloud App Security Ninja blog and learn about Ninja Training 


Go deeper with these interactive guides: 




 


To experience the benefits of full-featured CASB, sign up for a free trial—Microsoft Cloud App Security. 


Follow us on LinkedIn as #CloudAppSecurity. To learn more about Microsoft Security solutions visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity on Twitter, and Microsoft Security on LinkedIn for the latest news and updates on cybersecurity. 

How information governance brings value to business (VOICES OF DATA PROTECTION – Episode 3)

This article is contributed. See the original author and article here.

Host:  Bhavanesh Rengarajan – Principal Program Manager, Microsoft


Guest:  Atle Skjekkeland – CEO, Infotechtion


 


The following conversation is adapted from transcripts of Episode 3 of the Voices of Data Protection podcast.  There may be slight edits in order to make this conversation easier for readers to follow along.


 


This podcast features the leaders, program managers from Microsoft and experts from the industry to share details about the latest solutions and processes to help you manage your data, keep it safe and stay compliant.  If you prefer to listen to the audio of this podcast instead, please visit:  aka.ms/voicesofdataprotection


 


BHAVANESH:  Welcome to Voices of Data Protection. I’m your host, Bhavanesh Rengarajan, and I’m a principal program manager at Microsoft.


 


Hey, Atle. Thanks a lot for joining me today to talk about information governance. Why don’t you give a quick introduction about yourself?


 


ATLE:  Thank you, Bhavi. Nice to be here.  I’m the CEO for Infotechtion, which is a consulting firm specializing in information protection and governance, especially for M365 and beyond. We have offices in the U.S., UK and Europe, and our clients are usually quite global, highly regulated companies, which we held all the information in Office 365.


 


BHAVANESH:  Oh, that’s great. Atle, as we all know, the pandemic and the work-from-home adds an extra layer of complexity for our organization who are already dealing with a lot of digital transformation with all the data explosion to manage the data. And I know they’re trying to keep it safe and stay compliant all the time. So, how do you see organizations adapt to these changes, and what have been some of the main challenges that you’ve been hearing?


 


ATLE:  So, I think I can try to summarize this in three main challenges and priorities.  The first one is quite obvious. It’s go virtual. It’s like, okay, people need to be able to work from home. We need to scale that. And that might sound easier than it really is because it means that things like VPN, do we have enough VPNs and stuff like that for on-premise solution suddenly became an issue. It was basically not only about leveraging, therefore, Teams and making it available to anybody, but also looking at can we fast track to move to the cloud to, how do you say, ensure availability and reduce dependencies on secure logins via VPN, not terminal servers. So, go virtual was one.


 


Second, I would say stay safe. And stay safe, it’s not only, if you especially look at the virtual organization, those people that are now working across, perhaps not only a country but across the world, how do you ensure they find the information they need to do their job, but also that sensitive information is protected so that can’t be downloaded or shared with people it shouldn’t be shared with, and to ensure that when people work remotely, the information, the assets that the company sit on still stay safe.


 


And the third and perhaps last one is because many companies have had their revenue impacted, so we also see a big trend of, “Okay, how can we save money? How can we be smarter? How can we get rid of some of the stuff that we perhaps don’t need?” So, we’re seeing a lot of discussion about the ways I can reduce my operational expense.


 


For example, “Do I have legacy IT systems that now can be replaced with Microsoft 365? And if so, can I get that benefit quite fast, because I can’t afford for a two or three-year migration program or a replacement program? I will need to see the benefit, the cost savings within 12 months at the maximum.” So, those three things about going virtual, staying safe and secure, but also looking at we need to reduce operational cost, I would say, are perhaps the top three challenges.


 


BHAVANESH:  Ah, okay. So, when we think about reducing operational cost, people are usually thinking about information governance as something that they do to meet compliance requirements, right? But it’s, to my knowledge, I think it’s – it’s much more than that. Can you tell me how effective information protection program can be for organizations to increase the value of those programs?


 


ATLE:  Perhaps starting on the big picture before starting to answer your question, and how we look at it is that if you look at trying to improve customer engagement or employee engagement, or ensuring operational excellence to be more efficient, that also, like compliance, requires good information management. And information governance is basically the people across technology you put in place to manage data information. So therefore, risk is just a small piece of the possibilities.


 


There are many models available perhaps to look at four possible benefits of improving how you manage and protect information. First, this is adding value. What’s the value of better connecting people information and the insight? For example, in M365, can we make it easier for people to find information based on country, business area, process, what type of information it is instead of just search and the list just goes on? So, narrowing down things, that’s one example of adding value.


 


Second is reducing costs. How can managing information better help to reduce cost? And one, of course, is to improve efficiency of making more efficient workplace. But it’s also perhaps of implementing policies to get rid of information that doesn’t have any value, which actually two benefits to that. One, it reduces your storage requirement, and especially if you have a lot of the lawyers or customers have a lot of lawyers, it can also significantly reduce your e-discovery cost.


 


BHAVANESH:  That’s more on the lines of disposition that you’re talking about.


 


ATLE:  Correct, absolutely. So, it’s basically ensuring that records are identified and managed and those that’s not required, can you then automatically delete that? For example, a file that hasn’t been modified for the last three years, then that’s automatically deleted.  So, those two first of the four, adding value, reducing cost.


 


Third is minimizing risk. And of course, that’s what most people think of regarding compliance and information governance, but reducing risk, it’s not only about meeting regulations, but perhaps even more important is to meet the business standards, the business requirements, that this information has value for us for 30 years or five years. Okay, let’s ensure we retain it, then, that long.


 


And the last one is perhaps the fluffiest one, but it’s really about positioning them for the future. And that is, how can information help us identify new opportunities? For example, in Office 365, if you have used master data as metadata to manage the content, then you basically allow you in the future to connect the structural data with the unstructured information, which then becomes the foundation for digital transformation in the future. So, perhaps information can find you depending on what data you’re looking for, and you can see the content, which is the context of the data you’re working on.


 


BHAVANESH:  That’s great. Based on the solution that we have rolled out in Microsoft, so can you point out some big win examples with some of the organization that you work with who’ve directly experienced from having a solid and robust, you know, compliance and governance solution in place?


 


ATLE:  Oh, yes. The question is just how to do that in a couple of minutes. (Laughter.) So, let me try. 


 


So, one perhaps, which we worked a lot with, they basically realized that we need to better manage information to help people find it, but also to reduce risk, especially operational risk. Compliance was further down there. This organization has a highly regulated, around 40,000 users with offices around the world. So, but it was not only those two benefits that were looking for or goals of improving access to information at reduced operational risk, but also, how can I reduce costs at the same time? So, how can I manage the information better but reduce cost at the same time?


 


Quite early in their journey, they actually invited in different technology providers, many of the leading information content management, record management solution. And the team that evaluated it found that Microsoft information governance was actually the preferred solution, because it was perceived to have the best user experience and the most integrated approach.


 


And that’s actually now live for almost those 40,000 users with the following benefits: You have the improve access to information that people can now search and find information based on business unit, process, and so on; you have the improved control. As an example, the records management is automated based on what people are doing. So, it’s not like, please remember to think of this as a record and then classify it correctly. That happens automatically based on what people are working on.


 


And third, again, one of the benefits they’re looking for, objectives they’re looking for was reduce cost, because that entire program has then, first phase was setting the foundation in place, and that foundation is now used to replace the legacy system. So basically, when we finished replacing the lost legacy system, you actually have a positive return of investment while you still got these other benefits.


 


BHAVANESH:  I think a lot of information technology decision makers are aware, you know, and they want to basically upgrade their information governance strategies, as well. But they kind of fail to justify the business case to their senior management. What would your recommendation to them be?


 


And the second part to this question, which I really laughed at, is usually how long does it take for organizations to kind of, you know, go through the process, set all these things up and get into the stable state motion of, you know, having the right strategy in place?


 


ATLE:  So, for the first part of your question, perhaps another four things.  First is – is get the facts from the business. Are they struggling with finding information or trusting the information they find today? Have there been incidents? So, it’s really about, mostly, information availability, completeness, and trustworthiness. How does business feel that’s working today? And usually, tools like maturity assessment or service are a way to gather that.


 


Second, get the facts from legal and compliance. Are there regulations like GDPR or business standards, internal requirements they have to meet? How well are those being met with systems? How are the risk and possible exposure?


 


And three, get the facts from IT department, IT staff, especially around legacy system. Is there a hard business case there with an ROI, based on replacing legacy systems? Just as an example, a leading content management system called Documentum, we found that had 1,500 users. We found that that actually, the annual cost of that in one organization was higher than the information protection and governance add-on license for 15,000 users. So, there is a business case sometimes, very in your face that can help you, how do you say, justify that we need to prove this, in addition to all the benefits.


 


And based on those three things, then look at, okay, what are we trying to achieve for the organization? What’s our IT strategy goal and ensuring that your information governance and compliance goal supports that. So, in the future, you can say, why are we doing this? We’re doing this to achieve this, based on the strategic roadmap or the business objectives, because it can’t just be about risk. And it’s really sometimes about thinking outside the box to say, how do we position this and how do we show value of managing information?


 


And your second part of the question is like, okay, so how long will this take me? (Laughter.) I think I always wish it could be faster. Actually, we try, actually, to make it as fast as possible. So, but sometimes you have to look at this in phases. You have to first look at, okay, we need a strategy in place, and we need to decide what’s important for us. And then we need a solution blueprint, the technical blueprint in place. That’s the foundation. That can sometimes be done in two to three months.


 


BHAVANESH:  This is always an evolving thing, right? It’s not necessarily that it’s going to be a one-way street. I mean, you’re going to keep going back.


 


ATLE:  Yeah, scope creep is in the cloud, it’s quite common because you have a new technology of opportunities that happens while you do it. But two-to-three months, you get the foundation in place, but then you have to start looking at, okay, if I’m going to replace solutions, if you have to add governance on preexisting solutions. And that’s where you have to be really smart to make this as quick as possible.


 


For example, if I have a lot of network share drive, can I put that into Azure first, use the machine learning to extract learning and quickly get that out? If I have a lot of metadata on the content in the legacy system, can I map that and just do a lift and shift, or perhaps call it move and improve with metadata mapping to help people find the search for it?


 


The length of those things, it’s usually sometimes depending on the complexity and the volume. But first of all, of how identifying a right strategy and testing that out and verifying that this approach will work, and then stepping on the gas.


 


BHAVANESH:  I think during these unprecedented times, it’s so difficult to manage compliance strategies. How do you manage your perfect beard and hair? (Laughter.)


 


ATLE:  (Laughter.) So, this beard came off the working on an information management project for a client, and I was five weeks away on the road living at hotels. When I got home again, I decided I’m not going to shave for five weeks and I’m not going to wear a suit for five weeks to ensure I get balance back in life. And since then, the suit had to come back on, but the beard stays. But I’m still waiting for my wife to give me a compliment for that.


 


BHAVANESH:  (Laughter.) I think it’s worked really well for you.  Okay. So, Atle, the last part of the podcast is the quickfire round. So, before we close out the session, I’m going to shoot a few terms that you and I want to hear back from you what you think. What’s the first thing that comes to your mind when you think about these terms, right?  First, information governance?


 


ATLE:  Mature customers, because most people don’t even get what it means. It’s the people that started to realize that when you buy Software as a Service, then the vendor will own the software, that the information is what you need to manage. It’s information that will flow and you need the asset for the future, and information governance is the framework around it. But I would say information governance, it’s the mature customers, the people that really started to think about their future and the need, the value of information, they’re the one that gets it.


 


BHAVANESH:  Remote work?


 


ATLE:  The new normal. (Laughter.) I just believe that people have realized that the time wasted on commuting and office space for heads down work is not coming back. But heads up work, when you think, meetings and workshops, yes, you go to the office. Perhaps a different type of office, but remote work, that’s the new normal.


 


BHAVANESH:  Records management?


 


ATLE:  Ooh. Need for modernization. And what I mean by that is we meet way too many organizations that for records management have principles that were developed for the paper era. It all made sense. Like, if Iron Mountain, as an example, have stored a box for 10 years, let’s get the box back and open it to decide what we should do before we make a decision. But you can’t use that same principle in the digital era. You can’t do that per record in the digital era, in the volume and the increase in volume, you see.


 


So, records management needs new principles to allow for scaling across organization and automation. And that’s a lot of different – and a lot of the work we do is actually how to take your records management and build it into the platform, so it happens automatically.


 


BHAVANESH:  Machine learning?


 


ATLE:  I would say machine learning is a must-have in your plans and priorities, but you need to be very careful how fast you move forward with it to ensure that it actually provides value, and the accuracy is as good.


 


But I still think that any project needs to have that as part of the components because a machine might not be as smart all the time as a user, but they’re more predictable. They’re more consistent. So therefore, using machine learning to identify, capture, classify information is the way forward, more and more. It’s just not going to happen overnight.


 


BHAVANESH:  Okay. Let me also ask you this, then. Retention leading disposition?


 


ATLE:  Careful. You need to be careful thinking and planning this. You see a lot of organizations that want to get rid of information, but usually, it means you have to look at this in a phased approach. One, ensure that records are identified and classified so the important information gets the correct retention, and then perhaps auto-deletion at the end, because disposition review for records, it’s just, you will be wasting a lot of time on that.


 


Once you have a retention disposition for records, then you can set auto-policies in place for retention of non-records, information that hasn’t been changed for a while, information that hasn’t been updated for, say, the last three years, four years, and put policies in place to actually auth to delete that information.


 


And the benefits of that is, one, you meet, by ensuring your records are under control, you ensure that you can meet your business requirements for the information needs to be kept so long, and so on, but also compliance requirements for getting rid of information, like information about people; and two, based on then deleting information that are not records automatically after, say, three or four years, that means you can reduce your storage requirements, you can reduce the e-discovery costs and you can reduce search clutter, because when people are looking for information, the search results are not going to be cluttered by hits that are not relevant. It helps to find important information in the search results.


 


BHAVANESH:  Well, for disposition, I think the best answer is auto-delete, based on a strategy. Yeah, okay.


 


ATLE:  And it actually means that enough – in M365, now you have functionality to actually do more than organization actually should be doing to manage information over time. The technology is not the weak link anymore. It’s the framework and the principles they use to manage information. That’s what needs to be improved, be modernized for the digital era, because then it’s easy to actually configure and automate things in the system.


 


To learn more about this episode of the Voices of Data Protection podcast, visit:  https://aka.ms/voicesofdataprotection.


For more on Microsoft Information Protection & Governance, click here.


To subscribe to the Microsoft Security YouTube channel, click here.


Follow Microsoft Security on Twitter and LinkedIn.


 


Keep in touch with Bhavanesh on LinkedIn.


Keep in touch with Atle on LinkedIn.