TECHNOLOGY ARCHIVE

Microsoft 365

Explore blogs and other resources created by one of Quisitive's finest.

For additional questions regarding the content shared here, we encourage you to contact us.

Graphic titles the business case for migrating vmware workloads to azure. Illustration of hand holding briefcase, microsoft, quisitive and azure logos on image

Infographic: The Business Case for Migrating VMWare Workloads to Azure

By Quisitive | September 25, 2025

Broadcom’s recent changes to VMware licensing have left many enterprises facing higher costs and reduced flexibility. Azure VMware Solution (AVS) offers a fast, low-risk migration path — and the numbers show it delivers real business value.

Explore the infographic to see how AVS drives ROI, cost savings, and operational efficiency.

Read More
Derek Tannahill, Quisitive's VP of Security, professional headshot

Strengthening the Future of Security: A Conversation with Derek Tannahill, Quisitive’s New VP of Security

By Quisitive | September 17, 2025

Quisitive welcomes Derek Tannahill as VP of Security. In this interview, he shares his vision for security, identity, AI, and how Quisitive is helping customers align with Microsoft’s security strategy.

Read More
3 professional colleagues gathered around computer. Male and female looking at eachother in conversation, 3rd male looking at screen.

Enhancing Microsoft Identity Solutions with Quisitive’s User Lifecycle

By Cameron Fuller | September 10, 2025

Quisitive’s User Lifecycle builds on Microsoft Entra to solve real identity challenges – automating onboarding, access, compliance, and reporting to keep organizations secure and agile.

Read More
AI Agents vs AI Assistants

AI Agents vs. AI Assistants – What’s the Difference, and Why Should You Care?

By Quisitive | September 3, 2025

This blog will help you cut through AI buzzwords and understand the real difference between AI assistants and agents.

Read More
Two colleagues sitting at a table in a café, looking at a laptop together. One person is pointing at the screen while the other listens, both wearing glasses.

Modernizing User Management: Microsoft’s Lifecycle Transformation with Entra and API Workflow

By Michael Leach | August 26, 2025

From onboarding new hires to securing every login, Microsoft Entra is changing how organizations manage users. Discover how it simplifies identity, boosts security, and keeps pace with modern business needs.

Read More

Let’s Connect in Juneau  – Quisitive at the National Conference of State Legislatures 2025 NALIT & LINCS Seminar

By Quisitive | August 26, 2025

Quisitive is heading to Juneau for the NALIT & LINCS Seminar, September 8–11, 2025. Join us to connect with legislative IT and communications leaders and explore technology solutions for modern legislatures.

Read More
microsoft vulnerabilities featured image

Emergency Notice – High-Risk Microsoft Vulnerabilities Impacting Azure, Microsoft 365, Dynamics 365, and More

By Ed Higgins | August 20, 2025

See which products are impacted by these Microsoft vulnerabilities, why it matters, and what you need to do now.

Read More
Microsoft headquarters sign outside office buildings, representing Microsoft Office security vulnerabilities.

Critical Microsoft Office RCE Vulnerabilities: Why Immediate Action Is Non-Negotiable

By Ed Higgins | August 20, 2025

A new set of Microsoft Office flaws lets attackers break in without a single click. Here’s what you need to know before it’s too late.

Read More
A man sits in the office and chats with his Dynamics consultants about Dynamics 365 Pricing

Dynamics 365 2025 Release Wave 2: Key Updates and What They Mean for Your Business

By Quisitive | August 19, 2025

Discover what’s new in Dynamics 365 2025 Release Wave 2. From AI to automation, Quisitive helps you unlock features and maximize value.

Read More

The Evolution of Microsoft’s User Lifecycle Solutions

By Michael Leach | August 18, 2025

When managing user identities, securing access, ensuring compliance, and enabling productivity are paramount. Learn how Microsoft continues to lead in identity and access management, and how their user lifecycle solutions have evolved.

Read More