{"id":9944,"date":"2023-12-05T22:04:19","date_gmt":"2023-12-05T22:04:19","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=9944"},"modified":"2023-12-05T22:04:19","modified_gmt":"2023-12-05T22:04:19","slug":"microsoft-security-with-lenovo","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/","title":{"rendered":"Microsoft Security With Lenovo"},"content":{"rendered":"<p>This solution brief talks through how Microsoft and Lenovo have collaborated to provide a security solution for remote workforces.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bcvl7o\" target=\"_blank\" rel=\"noopener\">View: Microsoft Security With Lenovo<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the trend toward working from home continues, keeping your employees (and your data!) safe when they are online is becoming more and more challenging.<\/p>\n<p>The unique partnership of @Lenovo and @Microsoft combines hardware powered by ThinkShield with Microsoft. This is designed to always protect your workforce no matter where they are or which of your systems they are accessing. <\/p>\n<p>With a simple and efficient cloud-based system providing multifactor authentication and conditional access, you can rest assured that your team can access your systems whenever they need without risking data security.<\/p>\n<p>Find out more today by contacting Abrahams Consulting LLC.<\/p>\n","protected":false},"author":2,"featured_media":9943,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1142,1139,1136],"tags":[],"class_list":["post-9944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lenovo","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Security With Lenovo - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security With Lenovo - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"As the trend toward working from home continues, keeping your employees (and your data!) safe when they are online is becoming more and more challenging. The unique partnership of @Lenovo and @Microsoft combines hardware powered by ThinkShield with Microsoft. This is designed to always protect your workforce no matter where they are or which of your systems they are accessing.  With a simple and efficient cloud-based system providing multifactor authentication and conditional access, you can rest assured that your team can access your systems whenever they need without risking data security. Find out more today by contacting Abrahams Consulting LLC.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T22:04:19+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Microsoft Security With Lenovo\",\"datePublished\":\"2023-12-05T22:04:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\"},\"wordCount\":28,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg\",\"articleSection\":[\"Lenovo\",\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\",\"name\":\"Microsoft Security With Lenovo - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg\",\"datePublished\":\"2023-12-05T22:04:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security With Lenovo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security With Lenovo - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security With Lenovo - TechTonic Times","og_description":"As the trend toward working from home continues, keeping your employees (and your data!) safe when they are online is becoming more and more challenging. The unique partnership of @Lenovo and @Microsoft combines hardware powered by ThinkShield with Microsoft. This is designed to always protect your workforce no matter where they are or which of your systems they are accessing.  With a simple and efficient cloud-based system providing multifactor authentication and conditional access, you can rest assured that your team can access your systems whenever they need without risking data security. Find out more today by contacting Abrahams Consulting LLC.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/","og_site_name":"TechTonic Times","article_published_time":"2023-12-05T22:04:19+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Microsoft Security With Lenovo","datePublished":"2023-12-05T22:04:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/"},"wordCount":28,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg","articleSection":["Lenovo","Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/","name":"Microsoft Security With Lenovo - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg","datePublished":"2023-12-05T22:04:19+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/12\/Lenovo_Microsoft_Security_UK_Brochure_EN_EMEA_EXT_2211_EC_Version_C12W5_thumb.jpg","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/microsoft-security-with-lenovo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security With Lenovo"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=9944"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9944\/revisions"}],"predecessor-version":[{"id":9945,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9944\/revisions\/9945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/9943"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=9944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=9944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=9944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}