Explore blogs and other resources created by one of Quisitive's finest.
For additional questions regarding the content shared here, we encourage you to contact us.
Broadcom’s recent changes to VMware licensing have left many enterprises facing higher costs and reduced flexibility. Azure VMware Solution (AVS) offers a fast, low-risk migration path — and the numbers show it delivers real business value.
Explore the infographic to see how AVS drives ROI, cost savings, and operational efficiency.
Read MoreQuisitive welcomes Derek Tannahill as VP of Security. In this interview, he shares his vision for security, identity, AI, and how Quisitive is helping customers align with Microsoft’s security strategy.
Read MoreQuisitive’s User Lifecycle builds on Microsoft Entra to solve real identity challenges – automating onboarding, access, compliance, and reporting to keep organizations secure and agile.
Read MoreThis blog will help you cut through AI buzzwords and understand the real difference between AI assistants and agents.
Read MoreFrom onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.
Read MoreQuisitive is heading to Juneau for the NALIT & LINCS Seminar, September 8–11, 2025. Join us to connect with legislative IT and communications leaders and explore technology solutions for modern legislatures.
Read MoreSee which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.
Read MoreA new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.
Read MoreDiscover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.
Read MoreWhen managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.
Read More