{"id":7447,"date":"2023-01-18T17:15:16","date_gmt":"2023-01-18T17:15:16","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=7447"},"modified":"2023-01-18T17:15:16","modified_gmt":"2023-01-18T17:15:16","slug":"from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/","title":{"rendered":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer"},"content":{"rendered":"<p>Check out this document to learn more about essential Microsoft Surface security features designed to keep your endpoints safe. For additional information, feel free to contact us today.<\/p>\n<p><a href=\"https:\/\/stuf.in\/ball9x\" target=\"_blank\" rel=\"noopener\">View: From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>#Microsoft Surface eSecurity: chip-to-cloud protection. Windows Hello, Microsoft 365 Conditional Access, Microsoft Authenticator\u2014these are some of the security features you&#8217;ll enjoy. \ud83d\udc4d Abrahams Consulting LLC has the Surface solutions you need to secure your organization.<\/p>\n","protected":false},"author":2,"featured_media":7446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,1139,1136],"tags":[],"class_list":["post-7447","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"#Microsoft Surface eSecurity: chip-to-cloud protection. Windows Hello, Microsoft 365 Conditional Access, Microsoft Authenticator\u2014these are some of the security features you&#039;ll enjoy. \ud83d\udc4d Abrahams Consulting LLC has the Surface solutions you need to secure your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-18T17:15:16+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer\",\"datePublished\":\"2023-01-18T17:15:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\"},\"wordCount\":51,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg\",\"articleSection\":[\"Cloud\",\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\",\"name\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg\",\"datePublished\":\"2023-01-18T17:15:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg\",\"width\":600,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/","og_locale":"en_US","og_type":"article","og_title":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","og_description":"#Microsoft Surface eSecurity: chip-to-cloud protection. Windows Hello, Microsoft 365 Conditional Access, Microsoft Authenticator\u2014these are some of the security features you'll enjoy. \ud83d\udc4d Abrahams Consulting LLC has the Surface solutions you need to secure your organization.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/","og_site_name":"TechTonic Times","article_published_time":"2023-01-18T17:15:16+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer","datePublished":"2023-01-18T17:15:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/"},"wordCount":51,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg","articleSection":["Cloud","Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/","name":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg","datePublished":"2023-01-18T17:15:16+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/Endpoint_Security_digital_flyer_1_thumb.jpg","width":600,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=7447"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7447\/revisions"}],"predecessor-version":[{"id":7448,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7447\/revisions\/7448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/7446"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=7447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=7447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=7447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}