GROUP ARCHIVE

Blog

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Young woman working remotely from her kitchen at home, seated at a laptop.

Microsoft Solution Partner Designations and Specializations: What They Mean and Why They Matter

By Quisitive | August 6, 2025

This blog explains Microsoft’s latest proof of technical prowess so readers can understand what Advanced Specializations are.

Read More

Microsoft Is Retiring SharePoint 2013 Workflows – Here’s What That Means for Nintex Users

By Quisitive | August 1, 2025

Don’t wait until the deadline hits. SharePoint 2013 workflows are being retired, and if your business still depends on them, you need a transition plan. This guide outlines the key dates, risks, and your options.

Read More
Featured Image - EverWatch

​​​Inside the Cockpit: How Quisitive Operates the EverWatch Tie Fighter​

By Cameron Fuller | July 28, 2025

See how Quisitive’s EverWatch monitors Azure in real-time and how our team manages alerts, triage, automation, and diagnostics.

Read More
image that features article title on blue background

The SharePoint Zero-Day Breach: Why Cloud Migration and Managed Security Matters 

By Ed Higgins | July 25, 2025

What SharePoint’s zero-day crisis reveals about our collective blind spots.

Read More
EverWatch Azure Monitoring Solution Blog 2 Feature Image

​​​Deploying the Tie Fighter: Introducing the EverWatch Azure Monitoring Solution​

By Cameron Fuller | July 15, 2025

With EverWatch, you can ensure that your systems are running smoothly and efficiently. The Quisitive solution is designed to assist in managing resources more efficiently, offering insights for making informed decisions.

Read More
A shield deflects an attack to symbolize using Vulnerability Remediation best practices to improve your Cloud Security posture

Improving Your Cloud Security Posture with Vulnerability Remediation: 10 Best Practices for the Modern Enterprise

By Christophe Foulon | July 2, 2025

Discover key vulnerability remediation best practices to enhance your security posture and minimize potential business risks.

Read More
Blog Feature Image - Legos and Azure Monitoring - Lego Tie Fighter Box

4 Lessons Legos Taught Me About Monitoring Azure

By Cameron Fuller | July 2, 2025

Understand the importance of Azure monitoring and learn best practices for maintaining your cloud environment, all through the lens of Legos.

Read More
Blog Feature Image: How Microsoft Purview Helps in the Age of AI and Data Chaos - a man asleep at his desk and dreaming of Microsoft Purview

How Microsoft Purview Helps You Sleep Easier in the Age of AI and Data Chaos

By Quisitive | June 27, 2025

Learn why Microsoft Purview is an essential tool for data management and mitigating cybersecurity risks in the age of AI.

Read More
Blog Feature Image - 10 Cloud Network Security Best Practices, Image of a cloud on top of a circuit board

10 Cloud Network Security Best Practices to Protect Your Business

By Christophe Foulon | June 25, 2025

Navigating cloud network security is crucial for success. Learn 10 practical tips and best practices to enhance your security posture in the cloud.

Read More
Blog Feature Image - Is Microsoft Teams HIPAA Compliant A Comprehensive Guide. Teams logo overlaid on an image of a stethoscope

Is Microsoft Teams HIPAA Compliant? A Comprehensive Guide 

By Christophe Foulon | June 20, 2025

No software is compliant out of the box, but Teams makes it easy. This guide details 8 steps to ensure Microsoft Teams is HIPAA compliant.

Read More