INDUSTRY ARCHIVE

Professional Services

Explore blogs and other resources created by Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Why Quisitive Built the AI Operations Center

Why We Built the Airo™ AI Workspace: A Conversation with Jimmy Ledbetter

By Quisitive | October 15, 2025

Most companies aren’t short on AI ideas – they’re short on structure. In this conversation with Jimmy Ledbetter, SVP of Strategy at Quisitive, we explore why scaling AI is so difficult and how the AI Operations Center was built to solve it.

Read More
Derek Tannahill, Quisitive's VP of Security, professional headshot

Strengthening the Future of Security: A Conversation with Derek Tannahill, Quisitive’s New VP of Security

By Quisitive | September 17, 2025

Quisitive welcomes Derek Tannahill as VP of Security. In this interview, he shares his vision for security, identity, AI, and how Quisitive is helping customers align with Microsoft’s security strategy.

Read More
AI Agents vs AI Assistants

AI Agents vs. AI Assistants – What’s the Difference, and Why Should You Care?

By Quisitive | September 3, 2025

This blog will help you cut through AI buzzwords and understand the real difference between AI assistants and agents.

Read More
A person's hand over a desk littered with laptops with ERP tech on screen, calculators, and printed reports - Embracing Change During Periods of Cloud Transformation ERP Event Feature Image

Legacy ERP: The Cybersecurity Time Bomb You Can’t Afford to Ignore

By Quisitive | August 27, 2025

Legacy ERP systems like Dynamics GP and SL aren’t just outdated, they’re a cybersecurity risk. Discover the hidden dangers and why migrating to cloud ERP is the safer, smarter choice.

Read More
Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
A man sits in the office and chats with his Dynamics consultants about Dynamics 365 Pricing

Dynamics 365 2025 Release Wave 2: Key Updates and What They Mean for Your Business

By Quisitive | August 19, 2025

Discover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More
A digitally created image shows a group of business professionals, both men and women in formal attire, working with laptops and tablets in a high-tech environment. Surrounding them is an evolving landscape of cybersecurity concepts such as cloud storage, padlocks, shields, artificial intelligence (AI), data analytics, networking, and secure connections.

What is Proactive Risk Management and Why Continuous Security Monitoring Matters

By Christophe Foulon | August 18, 2025

Learn why today’s forward-thinking executives are making proactive risk management and continuous security monitoring their top priorities.

Read More

Why OAuth Falls Short, Agent Taxonomy and Scenarios that Challenge Security, and Solution Ideas

By Ed Higgins | June 15, 2025

In this posting, let’s explore why OAuth falls short, look at Agent taxonomy, security challenges, and insights that can help.

Read More