This episode argues that although Amazon Web Services (AWS) dominates infrastructure, the real “cloud war” has shifted to the enterprise control plane — the system that enforces identity, policy, and governance across hybrid environments. Most enterprises are hybrid by default, and the winner is the provider that controls who can access what, under which conditions, and with auditable compliance. According to the discussion, AWS leads in compute but lacks a unified control plane across people, devices, policies, and data — an area where Microsoft’s identity and governance stack holds structural advantage.

Apple Podcasts podcast player iconSpotify podcast player iconYoutube Music podcast player iconSpreaker podcast player iconPodchaser podcast player iconAmazon Music podcast player icon

You face growing risks as AWS Losing Control of the enterprise control plane becomes clear. Cloud environments no longer revolve around just infrastructure; identity and governance now drive control. When the control plane fails, you can lose access to orchestration dashboards worldwide, even if core cloud infrastructure stays intact. This gap creates blind spots in your security and operations, forcing manual incident responses and delaying audits. The cloud’s global control points often act as single points of failure, exposing your enterprise to systemic vulnerabilities that demand new strategies focused on governing the governance layer itself.

Key Takeaways

  • AWS is losing control of the enterprise control plane, exposing businesses to significant operational risks.

  • Identity and governance are now critical for maintaining security and compliance in hybrid cloud environments.

  • Control plane failures can lead to widespread disruptions, affecting services like eCommerce and streaming.

  • AWS Identity and Access Management (IAM) has limitations that can hinder effective identity management across hybrid setups.

  • Gaps in the control plane can create security and compliance risks, making continuous monitoring essential.

  • Implementing redundant and distributed control mechanisms can enhance resilience in your cloud operations.

  • Using multi-cloud management tools can improve operational reliability and reduce dependency on a single provider.

  • Establishing clear vendor accountability and understanding SLAs are crucial for maintaining control and compliance.

Enterprise Control Plane Essentials

What Is the Enterprise Control Plane?

The enterprise control plane serves as the backbone of modern hybrid cloud environments. It encompasses identity, policy, and governance, which have become the new battlegrounds beyond traditional infrastructure. This control plane allows you to manage orchestration, compliance, and security across various platforms.

Component / Plane

Core Functions and Responsibilities

Typical Deployment Location

Control Plane

Orchestration, job scheduling, metadata storage, monitoring, centralized management, compliance enforcement, security, and unified deployment

Vendor cloud (SaaS)

Data Plane

Execution tasks including data extraction, change data capture replication, transformation, and data transfer

Vendor cloud, customer VPC, or on-premises depending on compliance and architecture

This separation enables centralized control while allowing data processing to occur in locations that meet regulatory and performance requirements.

Why Identity and Governance Matter

Unified control across hybrid environments is essential for maintaining security and compliance. As organizations increasingly adopt hybrid cloud strategies, they face unique challenges. Security policies must remain consistent across multiple platforms. This consistency protects workloads and ensures regulatory compliance.

Security and compliance are top concerns for IT leaders managing hybrid environments. Integrating hybrid cloud security best practices into your architecture is critical to protect workloads, ensure regulatory compliance, and maintain business trust.

Identity has emerged as the primary control surface in enterprise cloud strategies. By 2026, identity will no longer be seen merely as infrastructure but as the primary attack surface and control mechanism for zero trust. This shift emphasizes that identity is central to security, requiring continuous evaluation of access rather than periodic reviews.

  • Identities include both human and non-human entities, highlighting the growing risk of unmanaged machine identities.

  • Organizations will need to control who decides access under what conditions, moving beyond compliance-driven identity and access management.

  • Automation ensures that access aligns continuously with real-time conditions.

In this evolving landscape, you must prioritize identity and governance to maintain control over your enterprise. The future of cloud computing hinges on your ability to navigate these complexities effectively.

AWS Losing Control: Failures and Limits

AWS Losing Control: Failures and Limits
Image Source: unsplash

AWS Control Plane Failures

AWS is losing control of the enterprise control plane, especially in hybrid environments. Control plane failures can lead to significant operational disruptions. For instance, consider a situation where an incorrect route table caused downtime during peak hours. The fix was simple, but the impact was substantial. This example highlights the importance of fully understanding the underlying architecture.

When AWS experiences control plane disruptions, the consequences can ripple across various sectors. The reliance on a single cloud provider creates a single point of failure. This reliance can lead to widespread operational disruptions when that provider encounters issues.

Common impacts of AWS control plane failures include:

  • eCommerce companies facing order delays during peak periods.

  • Streaming services like Netflix experiencing partial downtime.

  • IoT platforms losing connectivity with devices.

  • B2B SaaS providers struggling to authenticate user sessions or access various APIs.

These disruptions can result in significant economic losses, emphasizing the vulnerability of businesses that depend heavily on AWS.

Limits of AWS Identity and Access Management

AWS Identity and Access Management (IAM) has notable limitations compared to holistic identity management solutions. These limitations hinder your ability to manage identity and governance effectively across hybrid environments.

Challenge

Description

Setting up user profiles

Onboarding users with the correct roles and privileges is complex, especially in large organizations.

Interoperability and app sprawl

IAM must manage access across various applications and devices, which can lead to compatibility issues.

Continuity – maintaining focus

IAM requires ongoing management and regular audits, rather than being a one-time setup.

Role creep and permission glut

As employees change roles, they may retain unnecessary access, posing security risks.

Scaling hurdles and performance drag

As organizations grow, IAM systems may struggle to scale, leading to slow authentication processes and potential security vulnerabilities.

In hybrid environments, lifecycle governance is essential. It requires integration across HR systems, directories, and cloud applications to ensure that access reflects the real organizational state. This integration is critical for preventing security risks associated with stale or orphaned roles.

Unfortunately, AWS IAM lacks native support for Customer IAM (CIAM) use cases. There is no centralized identity governance, and role provisioning often remains manual or scripted. Additionally, you may find a lack of visibility into access across multi-cloud or on-premises systems.

The limitations of AWS IAM can lead to serious security risks. For example, 16% of cloud-related breaches stem from misconfigured IAM settings, often tied to default roles with excessive permissions. AWS IAM tools are platform-specific, resulting in fragmented identity management. To maintain control and compliance, enterprises require IAM solutions that provide unified control and automated lifecycle management.

Enterprise Risk from Control Plane Gaps

Security and Compliance Risks

Gaps in the enterprise control plane can expose you to significant security and compliance risks. Many enterprises still rely on outdated governance frameworks. These frameworks struggle to keep pace with the rapid deployment of AI systems. As a result, you may face challenges in maintaining compliance and security across your hybrid cloud environments.

Consider the following risks:

  • Lengthy compliance reviews can block deployment, leading to operational delays.

  • Risk assessments often occur infrequently, typically only during the design phase. This approach fails to address ongoing risks that arise as your environment evolves.

  • Data exposure risks increase due to data transfer between environments, especially in regulated industries like finance and healthcare.

These factors create a complex landscape where maintaining security becomes increasingly difficult. You must prioritize continuous monitoring and adapt your governance frameworks to address these evolving threats.

Operational and Business Continuity Risks

Control plane gaps can also lead to operational and business continuity risks. When you experience a cloud outage, the impact can be severe. Access disruptions can halt critical business functions, leading to lost revenue and damaged reputations.

Here are some common operational risks associated with control plane gaps:

  • Visibility Issues: You may struggle to track what resources are running, where they are located, and their associated costs.

  • Compliance Complexities: Ensuring adherence to policies across different cloud environments can be challenging.

  • Cost Management Problems: Fragmented spending across various tools can complicate budget management.

  • Need for Automation: Manual enforcement of governance policies often proves ineffective due to rapid changes and human error.

To mitigate these risks, you must implement robust incident management strategies. Establishing clear guardrails and policy enforcement mechanisms will help you maintain operational continuity. Additionally, consider investing in security services that provide real-time insights into your hybrid environment. This proactive approach will enable you to respond swiftly to incidents and minimize disruptions.

Cloud Provider Comparison: Identity and Control

Microsoft Entra ID vs AWS IAM

When comparing identity and governance capabilities, you will notice distinct differences between AWS IAM and Microsoft Entra ID. Microsoft Entra ID builds on the foundation of on-premises Active Directory, allowing for a hybrid identity model. This model enables users to exist in both cloud and on-premises environments seamlessly. In contrast, AWS IAM operates primarily at the account level. It typically does not sync user data, relying instead on federation or trust models to manage access to AWS resources. This architectural difference significantly impacts how you handle identity and governance across hybrid setups.

Google Cloud and Azure Control Planes

Both Google Cloud and Azure offer unique advantages in identity and governance compared to AWS. Here are some key features:

  • Azure: It emphasizes a separation between access and compliance. This approach allows you to manage governance without complicating role assignments.

  • Google Cloud Platform (GCP): It utilizes a declarative policy model with organizational guardrails. This model provides clarity and predictability in permissions management.

Provider

Strategic Advantage

Microsoft Azure

Azure Arc provides a unified view of all resources, enhancing governance and security across environments.

Google Cloud

Anthos offers visibility into Kubernetes clusters and workloads across all environments, supporting governance.

Microsoft Entra ID stands out as a leading solution for unified identity management across hybrid clouds. It serves as an identity fabric that connects users to applications, enforces security policies, and manages identity lifecycles. This capability is foundational for businesses operating in a cloud-first environment. Entra ID also provides tools that make Zero Trust practical and scalable, focusing on identity as the core of security to protect data and users. With over 610 million monthly active users, including 400 million from Microsoft tenants, Entra ID is essential for organizations of all sizes.

Hybrid Architecture Challenges

Hybrid Architecture Challenges
Image Source: unsplash

Integrating On-Premises and Cloud

Integrating on-premises systems with cloud control planes presents several challenges. You may encounter downtime during migration, which can disrupt operations and hurt your reputation. Integration difficulties often arise due to latency and API compatibility issues. These problems can complicate the integration process, making it harder to achieve a seamless experience. Additionally, skill gaps within your team can hinder cloud adoption. Many organizations face resistance to change, which can slow down the integration process.

Challenge

Description

Downtime during migration

Can disrupt operations and hurt reputation.

Integration difficulties

Issues like latency and API compatibility can complicate the integration.

Skill gaps

Lack of expertise and resistance to change can hinder cloud adoption.

Data and Network Synchronization

Achieving seamless data and network synchronization in hybrid cloud architectures is another significant challenge. You must ensure interoperability between public cloud services, private cloud platforms, and on-prem infrastructure. Each environment often uses different API models, credential systems, and security controls. This fragmentation increases your engineering workload and heightens operational risk.

Limited visibility across hybrid environments can create blind spots. You may struggle to consolidate signals from cloud-native tools and on-prem monitoring agents. This lack of a unified view can hide performance issues or security anomalies. Furthermore, network latency can increase when applications perform frequent cross-environment calls. This latency decreases performance for tightly coupled workloads, which can degrade quickly when distributed across long paths.

Barrier Type

Description

Integration Complexity

Hybrid cloud deployments require seamless interoperability between public cloud services, private cloud platforms, and on-prem infrastructure. Many organizations struggle because each environment uses different API models, credential systems, monitoring tools, and security controls. This fragmentation increases engineering workload and heightens operational risk. It also complicates data synchronization when workloads move frequently between platforms.

Limited Visibility

Hybrid environments often produce distributed signals across cloud-native tools, on-prem monitoring agents, and network telemetry systems. Many organizations cannot consolidate these signals into a unified view. This creates blind spots that hide performance issues or security anomalies.

Security Fragmentation

Hybrid cloud expands the security footprint across multiple trust zones. Each environment handles identity, encryption, access control, and logging differently. Policy drift occurs when settings diverge over time or when security gaps appear in operational transitions.

Network Latency

Latency increases when applications perform frequent cross-environment calls. This decreases performance for tightly coupled workloads. This issue matters because latency-sensitive workflows degrade quickly when distributed across long paths. Businesses can address this challenge by redesigning architectures to minimize chatty interactions, using edge connectivity in colocation facilities, and placing interdependent services in closer proximity.

Scalability Constraints

Scalability remains a critical concern in hybrid architectures. As your enterprise grows, you may find it challenging to maintain unified control and policy enforcement across diverse environments. The operational burden increases as your teams must navigate complex and incompatible systems. This complexity raises the risk of errors and inefficiencies in task execution. Routine tasks can become error-prone and slow due to the lack of a unified control plane.

Maintaining consistency across environments leads to significant operational challenges. Configuration management issues can arise, making it difficult to enforce coherent security policies. Each infrastructure model introduces unique security requirements, complicating your protection strategies. The lack of a central perimeter means traditional security methods often fail, leaving your enterprise vulnerable to lateral threat movement.

Operational Burden

Description

Expertise in Multiple Ecosystems

Teams must navigate complex and incompatible systems, increasing the risk of errors.

Inefficient Task Execution

Routine tasks become error-prone and slow due to the lack of a unified control plane.

Configuration Management Issues

Maintaining consistency across environments leads to significant operational challenges.

To overcome these challenges, you must prioritize a strategic approach to hybrid architecture. Focus on integrating systems effectively, ensuring data synchronization, and addressing scalability constraints to maintain control and compliance.

Building Resilience in the Control Plane

Redundant and Distributed Control

To enhance resilience in your enterprise control plane, you must implement redundant and distributed control mechanisms. These strategies prevent single points of failure and ensure continuous operation. Here are some best practices to consider:

  • Conduct a comprehensive process analysis to identify current control functions and interdependencies.

  • Establish clear communication standards and protocols before system design.

  • Design redundancy into critical system components and communication paths from the start.

  • Implement comprehensive cybersecurity measures to protect the control system network.

  • Develop thorough training programs for all personnel interacting with the new system.

  • Plan for ongoing system evolution and optimization based on operational experience.

By focusing on redundancy at all layers, you can prevent disruptions. Load balancing distributes traffic effectively, while replication across locations reduces the impact of localized failures. Additionally, failover mechanisms ensure backup components take over automatically when primary components fail. These measures significantly enhance your cloud resilience.

Multi-Cloud Management Tools

Multi-cloud management tools play a crucial role in building resilience within your control plane. They provide a unified interface for managing resources across various environments, reducing operational fragmentation. Here are some key benefits of using these tools:

  • Backup and disaster recovery solutions ensure data durability and fast recovery across different cloud providers, which is essential for maintaining business continuity.

  • Automated recovery processes minimize manual effort and speed up response times during outages, contributing to overall resilience.

  • Consistent security policies enforce uniform measures across diverse environments, helping mitigate risks associated with outages and breaches.

These tools also facilitate cross-cloud data management, allowing for data replication and orchestration of failover. This capability reduces reliance on a single cloud provider, enhancing your operational reliability. With granular recovery options, you can achieve point-in-time recovery and application-consistent backups, minimizing downtime and data loss.

Automation and Monitoring

Automation and monitoring are vital for maintaining resilience in your control plane. By automating routine tasks, you can reduce human error and improve efficiency. Implementing monitoring solutions provides real-time insights into your systems, allowing you to detect issues before they escalate.

Consider integrating observability tools that offer visibility across your hybrid environments. These tools help you track performance metrics and security events, ensuring you can respond swiftly to incidents. By prioritizing automation and monitoring, you create a proactive approach to managing your enterprise control plane, ultimately enhancing your cloud resilience.

Vendor Accountability and Enterprise Checklist

Key Vendor Questions

When evaluating cloud vendors, you should ask critical questions to ensure they meet your enterprise's needs. Here are some essential inquiries to consider:

  • What independent oversight mechanisms do you have in place? Ensure that the vendor provides an oversight plane that offers visibility and enforces policies outside the runtime environment.

  • How do you manage risk in complex environments? Look for vendors that demonstrate effective risk management strategies, similar to how Airbnb uses external guardrails to halt experiments when metrics deviate.

  • Can you provide independent audit trails? This is crucial for maintaining accountability, especially in regulated environments.

These questions help you assess the vendor's commitment to transparency and reliability in their control plane.

SLA and Support Evaluation

Understanding the Service Level Agreement (SLA) is vital for your enterprise. A well-defined SLA outlines the expectations between you and your cloud vendor. Here are some key considerations:

"Taking the time to understand your business requirements is the best place to start when designing a quality SLA. Each provision should be easy to measure, ensuring clarity if your provider fails to meet minimum requirements."

Once the SLA is active, you must monitor it to ensure compliance. Regularly review the vendor's performance against the agreed-upon metrics. This proactive approach helps you avoid potential legal issues and ensures that the SLA serves as a living document guiding your business planning.

Governance and Compliance Needs

To ensure that cloud vendors meet governance and compliance requirements in hybrid environments, consider the following strategies:

  • Establish a unified view of the environment to maintain visibility.

  • Implement continuous controls monitoring to ensure compliance.

  • Automate compliance processes to reduce human error and improve efficiency.

  • Integrate FinOps practices to manage costs effectively.

These steps help you maintain control over your governance framework and ensure compliance across diverse environments. By demanding accountability from your vendors, you can mitigate risks and enhance operational reliability.

AWS is losing control of the enterprise control plane, exposing you to significant risks. Recent outages, like the one on October 20th, affected over 6.5 million users and disrupted services for more than 1,000 companies. This incident highlighted the critical nature of the US-EAST-1 region, which serves as a common control plane for AWS. Such vulnerabilities challenge your operational continuity and raise concerns about the reliability of cloud services.

To mitigate these risks, you must adopt identity-centric, resilient hybrid cloud strategies. A unified approach to identity and access management is essential for maintaining consistent security policies across platforms. This strategy not only safeguards workloads but also streamlines compliance efforts. By holding vendors accountable, you can ensure that your enterprise maintains control and compliance in an increasingly complex cloud landscape.

1
00:00:00,000 --> 00:00:03,600
Most organizations believe AWS is winning the cloud war,

2
00:00:03,600 --> 00:00:06,000
but they are looking at the wrong battlefield.

3
00:00:06,000 --> 00:00:08,400
While AWS still runs more global workloads

4
00:00:08,400 --> 00:00:10,400
than any other competitor enterprise control

5
00:00:10,400 --> 00:00:12,680
has shifted to a different arena entirely.

6
00:00:12,680 --> 00:00:15,000
The original cloud war focused on infrastructure,

7
00:00:15,000 --> 00:00:17,160
specifically who could provision compute fastest,

8
00:00:17,160 --> 00:00:19,880
scale storage cheapest and offer the broader service catalog.

9
00:00:19,880 --> 00:00:21,760
AWS won that war decisively,

10
00:00:21,760 --> 00:00:24,440
yet the new conflict centers on something else,

11
00:00:24,440 --> 00:00:28,520
identity, policy, and governance across the entire organization.

12
00:00:28,520 --> 00:00:30,800
In this environment, Microsoft has positioned itself

13
00:00:30,800 --> 00:00:33,280
as the control plane, while AWS continues

14
00:00:33,280 --> 00:00:34,840
to build the infrastructure underneath.

15
00:00:34,840 --> 00:00:37,480
Over 80% of enterprises are currently hybrid

16
00:00:37,480 --> 00:00:39,520
and will remain so through 2027,

17
00:00:39,520 --> 00:00:41,480
which is not a failure of cloud migration

18
00:00:41,480 --> 00:00:42,480
or a lack of commitment.

19
00:00:42,480 --> 00:00:44,400
Hybrid is the architectural end state.

20
00:00:44,400 --> 00:00:46,680
In these environments, the winner is not the provider

21
00:00:46,680 --> 00:00:47,720
with the most compute,

22
00:00:47,720 --> 00:00:50,240
but the one controlling identity, policy,

23
00:00:50,240 --> 00:00:53,280
and workflow across the entire organization.

24
00:00:53,280 --> 00:00:54,440
That is Microsoft.

25
00:00:54,440 --> 00:00:56,160
The infrastructure war is over.

26
00:00:56,160 --> 00:00:57,560
AWS won.

27
00:00:57,560 --> 00:01:00,160
We should be clear about what AWS actually accomplished.

28
00:01:00,160 --> 00:01:01,840
AWS dominates raw market share

29
00:01:01,840 --> 00:01:04,480
with 32% of global cloud infrastructure spending

30
00:01:04,480 --> 00:01:08,200
and offers 230 services across compute, storage, networking,

31
00:01:08,200 --> 00:01:09,200
and AI.

32
00:01:09,200 --> 00:01:12,760
With 33 regions and 105 availability zones,

33
00:01:12,760 --> 00:01:16,360
they built a mature ecosystem with deep DevOps automation

34
00:01:16,360 --> 00:01:20,840
and cost optimization tools that competitors still cannot match.

35
00:01:20,840 --> 00:01:24,240
The victory AWS achieved in infrastructure is not in question

36
00:01:24,240 --> 00:01:25,920
as it is a historical fact.

37
00:01:25,920 --> 00:01:27,560
However, here is the uncomfortable part

38
00:01:27,560 --> 00:01:30,080
that dominance does not translate to dominance in governance

39
00:01:30,080 --> 00:01:31,920
because the battleground has simply moved.

40
00:01:31,920 --> 00:01:34,760
Enterprises have stopped asking which cloud they should build on.

41
00:01:34,760 --> 00:01:37,520
As that question was settled years ago for most organizations,

42
00:01:37,520 --> 00:01:39,160
they asked it, received an answer,

43
00:01:39,160 --> 00:01:41,200
and moved on to a completely different problem.

44
00:01:41,200 --> 00:01:44,320
How to govern identity and policy across multiple clouds?

45
00:01:44,320 --> 00:01:45,680
That question has a different answer.

46
00:01:45,680 --> 00:01:48,280
This shift happened gradually, but around 2020,

47
00:01:48,280 --> 00:01:50,600
enterprises started noticing a significant problem

48
00:01:50,600 --> 00:01:51,880
with their architectural sprawl.

49
00:01:51,880 --> 00:01:55,560
They had workloads on AWS, Azure, and Google Cloud.

50
00:01:55,560 --> 00:01:58,720
Along with on-premises infrastructure, they could not decommission.

51
00:01:58,720 --> 00:02:01,640
Managing five different identity systems became untenable

52
00:02:01,640 --> 00:02:04,480
because it meant maintaining five different audit trails,

53
00:02:04,480 --> 00:02:06,080
five compliance frameworks,

54
00:02:06,080 --> 00:02:08,400
and five different places to revoke access

55
00:02:08,400 --> 00:02:10,640
when an employee left the company.

56
00:02:10,640 --> 00:02:14,000
The result was a new demand, unified identity.

57
00:02:14,000 --> 00:02:17,480
AWS responded to this need with IAM Identity Center,

58
00:02:17,480 --> 00:02:20,680
which is a solid product for providing SSO and MFA

59
00:02:20,680 --> 00:02:21,920
across AWS accounts.

60
00:02:21,920 --> 00:02:24,520
But the architectural truth is that IAM Identity Center

61
00:02:24,520 --> 00:02:27,640
originates in AWS and is built specifically for AWS.

62
00:02:27,640 --> 00:02:29,600
When you federated to other platforms,

63
00:02:29,600 --> 00:02:32,600
you are extending AWS Identity outward

64
00:02:32,600 --> 00:02:35,120
and claiming that AWS is the source of truth.

65
00:02:35,120 --> 00:02:37,960
Microsoft EntraID approaches the problem from a different angle.

66
00:02:37,960 --> 00:02:39,880
EntraID originates in the workforce

67
00:02:39,880 --> 00:02:42,160
and is built for humans and their applications,

68
00:02:42,160 --> 00:02:43,360
rather than just servers.

69
00:02:43,360 --> 00:02:45,600
When EntraID federates with AWS,

70
00:02:45,600 --> 00:02:47,880
the Microsoft Identity Engine issues the tokens

71
00:02:47,880 --> 00:02:51,240
that grant AWS access, which is not a state of coexistence.

72
00:02:51,240 --> 00:02:53,120
It is subordination, the enterprise no longer

73
00:02:53,120 --> 00:02:54,880
sees two identity systems,

74
00:02:54,880 --> 00:02:57,200
but rather one Microsoft system managing access

75
00:02:57,200 --> 00:03:00,520
to multiple platforms that difference in origin matters at scale.

76
00:03:00,520 --> 00:03:03,240
When identity originates in one place and governs everywhere,

77
00:03:03,240 --> 00:03:06,160
you create control plane gravity that compounds over time.

78
00:03:06,160 --> 00:03:09,000
AWS built a cloud for developers and infrastructure teams

79
00:03:09,000 --> 00:03:11,560
by optimizing for rapid provisioning, cost flexibility

80
00:03:11,560 --> 00:03:13,000
and regional distribution.

81
00:03:13,000 --> 00:03:14,960
All of those features are valuable,

82
00:03:14,960 --> 00:03:17,800
but enterprises do not actually run on infrastructure.

83
00:03:17,800 --> 00:03:19,920
They run on identity policy and workflow.

84
00:03:19,920 --> 00:03:23,480
AWS either did not anticipate that shift or decided

85
00:03:23,480 --> 00:03:25,720
it was not a battle they wanted to fight.

86
00:03:25,720 --> 00:03:28,720
By 2023, the pattern was clear as enterprises standardized

87
00:03:28,720 --> 00:03:31,280
on Microsoft 365 for workforce collaboration

88
00:03:31,280 --> 00:03:33,160
through teams, SharePoint and Outlook.

89
00:03:33,160 --> 00:03:37,080
Over 95% of Fortune 500 companies use Microsoft 365,

90
00:03:37,080 --> 00:03:39,560
which is not a cloud choice so much as an identity choice

91
00:03:39,560 --> 00:03:41,880
because governance sits where the work happens.

92
00:03:41,880 --> 00:03:45,080
Microsoft owns the enterprise by owning the employee surface area.

93
00:03:45,080 --> 00:03:48,400
AWS owns the compute, but Microsoft owns the people.

94
00:03:48,400 --> 00:03:50,440
This is the inversion that nobody talks about.

95
00:03:50,440 --> 00:03:52,840
The infrastructure war is over and AWS won,

96
00:03:52,840 --> 00:03:55,040
but the enterprise war that determines how organizations

97
00:03:55,040 --> 00:03:58,040
actually operate is being decided on different terms.

98
00:03:58,040 --> 00:04:00,680
Those terms favor the company that controls identity,

99
00:04:00,680 --> 00:04:03,240
not the company that controls instances.

100
00:04:03,240 --> 00:04:05,080
What a control plane actually is,

101
00:04:05,080 --> 00:04:06,720
we need to define this term precisely

102
00:04:06,720 --> 00:04:09,480
because it gets thrown around until it loses all meaning.

103
00:04:09,480 --> 00:04:11,560
A control plane is not infrastructure

104
00:04:11,560 --> 00:04:13,840
and it is certainly not a collection of servers.

105
00:04:13,840 --> 00:04:15,880
It is the underlying system that governs

106
00:04:15,880 --> 00:04:17,800
who accesses what when they do it.

107
00:04:17,800 --> 00:04:20,160
And the specific conditions required for that access

108
00:04:20,160 --> 00:04:21,320
to be granted.

109
00:04:21,320 --> 00:04:23,400
In the era of traditional enterprise IT,

110
00:04:23,400 --> 00:04:26,520
Active Directory functioned as the primary control plane.

111
00:04:26,520 --> 00:04:28,480
It sat physically in the data center

112
00:04:28,480 --> 00:04:31,200
and controlled which users could log into which machines

113
00:04:31,200 --> 00:04:32,880
while managing group memberships

114
00:04:32,880 --> 00:04:34,560
and enforcing password policies.

115
00:04:34,560 --> 00:04:36,280
Everything in the environment flowed through it

116
00:04:36,280 --> 00:04:38,560
because it represented the single authoritative source

117
00:04:38,560 --> 00:04:39,880
of truth for identity.

118
00:04:39,880 --> 00:04:41,760
In the cloud, the control plane has shifted

119
00:04:41,760 --> 00:04:43,400
into something more complex.

120
00:04:43,400 --> 00:04:45,320
It is no longer just about managing machines

121
00:04:45,320 --> 00:04:48,000
but rather about identity, policy enforcement

122
00:04:48,000 --> 00:04:50,880
and compliance across every fragmented environment you own.

123
00:04:50,880 --> 00:04:52,280
This includes your cloud footprint,

124
00:04:52,280 --> 00:04:53,840
your remaining on-premises hardware,

125
00:04:53,840 --> 00:04:57,000
the edge and every SAS application your employees touch.

126
00:04:57,000 --> 00:04:58,600
A modern control plane is defined

127
00:04:58,600 --> 00:05:01,200
by three specific architectural components.

128
00:05:01,200 --> 00:05:03,160
First identity must be the origin point.

129
00:05:03,160 --> 00:05:05,520
I'm not talking about federation or synchronization

130
00:05:05,520 --> 00:05:07,400
but the actual origin where user accounts

131
00:05:07,400 --> 00:05:09,720
are created, managed and eventually revoked.

132
00:05:09,720 --> 00:05:12,320
This is the authoritative source where a person exists first

133
00:05:12,320 --> 00:05:13,400
when they join the company

134
00:05:13,400 --> 00:05:15,680
and where they are deleted first when they leave.

135
00:05:15,680 --> 00:05:16,920
In a functional architecture,

136
00:05:16,920 --> 00:05:19,760
every other system is merely downstream from this point.

137
00:05:19,760 --> 00:05:22,280
Second, policy must travel with the identity

138
00:05:22,280 --> 00:05:24,760
rather than sitting as a static rule in a database.

139
00:05:24,760 --> 00:05:27,440
These are dynamic policies that evaluate context

140
00:05:27,440 --> 00:05:30,880
in real time to determine if a login should be allowed.

141
00:05:30,880 --> 00:05:33,400
The system asks where the user is signing in from,

142
00:05:33,400 --> 00:05:34,880
whether their device is compliant

143
00:05:34,880 --> 00:05:36,920
and if their risk profile has suddenly spiked.

144
00:05:36,920 --> 00:05:38,360
Based on those shifting signals,

145
00:05:38,360 --> 00:05:41,560
the engine can enforce MFA, block access entirely

146
00:05:41,560 --> 00:05:43,360
or demand full device management.

147
00:05:43,360 --> 00:05:45,280
This is the reality of conditional access

148
00:05:45,280 --> 00:05:46,800
and continuous verification,

149
00:05:46,800 --> 00:05:48,560
which stands as the direct opposite

150
00:05:48,560 --> 00:05:50,280
of the old model where authentication

151
00:05:50,280 --> 00:05:52,040
equaled permanent trust.

152
00:05:52,040 --> 00:05:54,520
Third, governance must span every environment

153
00:05:54,520 --> 00:05:56,960
instead of being isolated to a single platform.

154
00:05:56,960 --> 00:05:59,880
You need one audit trail, one compliance dashboard

155
00:05:59,880 --> 00:06:01,800
and one centralized place to review

156
00:06:01,800 --> 00:06:04,600
who has access to what across the entire enterprise.

157
00:06:04,600 --> 00:06:07,960
This provides a single location to enforce data residency rules

158
00:06:07,960 --> 00:06:10,160
and prove to regulators that you are managing access

159
00:06:10,160 --> 00:06:13,360
correctly without jumping between a dozen different consoles.

160
00:06:13,360 --> 00:06:16,680
Now let's look at how AWS IAM compares to this model.

161
00:06:16,680 --> 00:06:20,520
AWS IAM is a resource-centric system designed specifically

162
00:06:20,520 --> 00:06:23,320
to control access to AWS resources.

163
00:06:23,320 --> 00:06:25,920
You define roles and attach policies to those roles

164
00:06:25,920 --> 00:06:28,360
to specify exactly which actions can be performed

165
00:06:28,360 --> 00:06:29,880
on which buckets or instances.

166
00:06:29,880 --> 00:06:33,240
An IAM user might assume a role to read from an S3 bucket

167
00:06:33,240 --> 00:06:36,280
while another role allows them to launch EC2 instances.

168
00:06:36,280 --> 00:06:39,000
While this is granular and undeniably powerful,

169
00:06:39,000 --> 00:06:42,280
the system is fundamentally built around resources, not people.

170
00:06:42,280 --> 00:06:45,280
The critical distinction is that AWS IAM does not

171
00:06:45,280 --> 00:06:47,320
originate identity for the enterprise.

172
00:06:47,320 --> 00:06:50,080
It originates identity specifically for AWS.

173
00:06:50,080 --> 00:06:54,440
When you create an IAM user, that user exists within an AWS account

174
00:06:54,440 --> 00:06:56,560
rather than within your actual organization.

175
00:06:56,560 --> 00:06:59,200
If your company operates multiple AWS accounts,

176
00:06:59,200 --> 00:07:01,280
you end up with multiple identity silos

177
00:07:01,280 --> 00:07:04,680
that require federation or AWS organizations to manage.

178
00:07:04,680 --> 00:07:08,680
Even then, the origin of that identity remains tethered to AWS.

179
00:07:08,680 --> 00:07:11,000
Microsoft Enter ID is an identity-centric system

180
00:07:11,000 --> 00:07:13,080
that attempts to control access to everything.

181
00:07:13,080 --> 00:07:14,960
It starts by asking who the person is,

182
00:07:14,960 --> 00:07:16,520
which applications they should access,

183
00:07:16,520 --> 00:07:18,080
what data they are allowed to see,

184
00:07:18,080 --> 00:07:19,560
and which devices they are using.

185
00:07:19,560 --> 00:07:20,880
It originates in the workforce.

186
00:07:20,880 --> 00:07:22,920
When you create a user in Enter ID,

187
00:07:22,920 --> 00:07:25,120
they are a person in your organizational directory

188
00:07:25,120 --> 00:07:29,560
who can access Azure, Microsoft 365, and thousands of SAS apps.

189
00:07:29,560 --> 00:07:33,000
They can even access AWS via SAML or OIDC trust.

190
00:07:33,000 --> 00:07:35,120
When Enter ID federates AWS,

191
00:07:35,120 --> 00:07:37,440
the Microsoft Identity Engine is the one issuing

192
00:07:37,440 --> 00:07:39,920
the tokens that grant access to the Amazon Cloud.

193
00:07:39,920 --> 00:07:43,600
The enterprise sees one identity system managing multiple platforms,

194
00:07:43,600 --> 00:07:47,080
which effectively turns AWS into just another resource

195
00:07:47,080 --> 00:07:49,320
that enter authenticated users can access.

196
00:07:49,320 --> 00:07:50,920
This is not a state of coexistence,

197
00:07:50,920 --> 00:07:53,800
but rather a form of architectural subordination.

198
00:07:53,800 --> 00:07:55,720
This distinction matters because of scale

199
00:07:55,720 --> 00:07:57,880
and what I call control plane gravity.

200
00:07:57,880 --> 00:08:01,000
When identity originates in one place and governs everywhere,

201
00:08:01,000 --> 00:08:03,400
that gravity begins to compound over time.

202
00:08:03,400 --> 00:08:05,920
Every new application that needs to authenticate users

203
00:08:05,920 --> 00:08:08,160
naturally gravitates toward that origin point,

204
00:08:08,160 --> 00:08:10,120
and every new policy requiring enforcement

205
00:08:10,120 --> 00:08:11,640
moves toward the governance layer.

206
00:08:11,640 --> 00:08:14,640
Eventually, that gravity becomes inescapable for the organization.

207
00:08:14,640 --> 00:08:18,040
AWS IAM provides roles and policies that are largely static,

208
00:08:18,040 --> 00:08:20,360
meaning a user either has permission to access a resource

209
00:08:20,360 --> 00:08:21,400
or they do not.

210
00:08:21,400 --> 00:08:23,120
Conditional access changes that equation

211
00:08:23,120 --> 00:08:25,640
by ensuring permission is evaluated continuously based

212
00:08:25,640 --> 00:08:27,280
on context, risk, and location.

213
00:08:27,280 --> 00:08:30,080
The same user might have access to sensitive data

214
00:08:30,080 --> 00:08:31,520
while sitting in the corporate office,

215
00:08:31,520 --> 00:08:33,520
but find themselves blocked from that same data

216
00:08:33,520 --> 00:08:36,160
while working from a coffee shop in a high-risk country.

217
00:08:36,160 --> 00:08:37,920
This is not a simple feature comparison,

218
00:08:37,920 --> 00:08:39,760
but a fundamental architectural difference.

219
00:08:39,760 --> 00:08:42,440
One system is built around the resources being accessed

220
00:08:42,440 --> 00:08:45,240
while the other is built around the people doing the accessing.

221
00:08:45,240 --> 00:08:47,720
In the modern enterprise, people are the control plane

222
00:08:47,720 --> 00:08:49,880
and the resources are always downstream.

223
00:08:49,880 --> 00:08:54,160
Entra ID is gravitational pull, one billion active users.

224
00:08:54,160 --> 00:08:55,880
To understand the weight of this system,

225
00:08:55,880 --> 00:08:58,760
you have to look at the sheer scale of the numbers involved.

226
00:08:58,760 --> 00:09:03,480
Microsoft Entra ID currently has one billion monthly active users

227
00:09:03,480 --> 00:09:05,800
which is not a traditional achievement for Microsoft

228
00:09:05,800 --> 00:09:08,560
as much as it is an unavoidable enterprise reality.

229
00:09:08,560 --> 00:09:12,400
Entra ID serves as the identity backbone for Microsoft 365,

230
00:09:12,400 --> 00:09:16,000
Azure Cloud Services, and thousands of federated SaaS applications.

231
00:09:16,000 --> 00:09:17,400
Increasingly, it is also becoming

232
00:09:17,400 --> 00:09:20,920
the primary identity backbone for accessing AWS.

233
00:09:20,920 --> 00:09:23,400
Reaching one billion active users means Entra ID

234
00:09:23,400 --> 00:09:25,640
is now the largest identity platform on the planet.

235
00:09:25,640 --> 00:09:26,800
This did not happen by design,

236
00:09:26,800 --> 00:09:29,560
but through the sheer force of architectural gravity.

237
00:09:29,560 --> 00:09:32,520
When Entra ID federates AWS, the workflow reveals

238
00:09:32,520 --> 00:09:34,280
who is actually in charge of the gate.

239
00:09:34,280 --> 00:09:36,880
An employee signs into Microsoft Teams using their

240
00:09:36,880 --> 00:09:39,680
enter credentials and then decides they need to access

241
00:09:39,680 --> 00:09:41,280
an AWS resource.

242
00:09:41,280 --> 00:09:44,520
When they click that link, Entra ID evaluates their identity,

243
00:09:44,520 --> 00:09:46,840
their device health, and their current risk profile

244
00:09:46,840 --> 00:09:48,400
before issuing a SAML assertion.

245
00:09:48,400 --> 00:09:50,720
That assertion is what grants them temporary credentials

246
00:09:50,720 --> 00:09:52,080
to enter AWS.

247
00:09:52,080 --> 00:09:55,240
Even though AWS logs the access and manages the resource,

248
00:09:55,240 --> 00:09:57,200
Microsoft is the one controlling the gate.

249
00:09:57,200 --> 00:09:58,960
That is not a partnership between equals

250
00:09:58,960 --> 00:10:01,040
but a clear architectural hierarchy.

251
00:10:01,040 --> 00:10:04,440
This gravitational pull extends far beyond simple identity

252
00:10:04,440 --> 00:10:07,400
and into the realm of policy and conditional access.

253
00:10:07,400 --> 00:10:09,200
When Entra ID federates AWS,

254
00:10:09,200 --> 00:10:11,000
it does not just handle the login,

255
00:10:11,000 --> 00:10:13,680
it enforces the organization's rules across the board.

256
00:10:13,680 --> 00:10:16,920
A company can set a single rule to block all AWS access

257
00:10:16,920 --> 00:10:19,440
from unapproved countries, and that rule applies

258
00:10:19,440 --> 00:10:23,560
to every federated user regardless of which AWS account

259
00:10:23,560 --> 00:10:24,720
they are trying to reach.

260
00:10:24,720 --> 00:10:27,280
You end up with one policy and one control plane

261
00:10:27,280 --> 00:10:29,080
governing multiple platforms.

262
00:10:29,080 --> 00:10:32,000
AWS IAM Identity Center is simply not built to do this

263
00:10:32,000 --> 00:10:34,040
because it was designed for AWS accounts.

264
00:10:34,040 --> 00:10:36,040
It can provide SSO across those accounts

265
00:10:36,040 --> 00:10:37,760
and federate external providers,

266
00:10:37,760 --> 00:10:40,200
but it does not originate identity for the enterprise.

267
00:10:40,200 --> 00:10:41,960
It originates in AWS.

268
00:10:41,960 --> 00:10:45,080
When you connect an external provider to IAM Identity Center,

269
00:10:45,080 --> 00:10:47,760
you are just extending the AWS framework outward

270
00:10:47,760 --> 00:10:49,800
rather than establishing an external system

271
00:10:49,800 --> 00:10:51,480
as the true source of truth.

272
00:10:51,480 --> 00:10:54,240
The distinction is subtle, but the architectural consequences

273
00:10:54,240 --> 00:10:55,160
are massive.

274
00:10:55,160 --> 00:10:57,080
Entra ID's pull is amplified by the fact

275
00:10:57,080 --> 00:11:00,480
that Microsoft 365 is ubiquitous with over 95%

276
00:11:00,480 --> 00:11:02,520
of Fortune 500 companies relying on it.

277
00:11:02,520 --> 00:11:04,480
This means the identity, the workflow,

278
00:11:04,480 --> 00:11:06,520
and the data for the world's largest companies

279
00:11:06,520 --> 00:11:08,000
all flow through Microsoft.

280
00:11:08,000 --> 00:11:09,400
Teams is where the decisions happen,

281
00:11:09,400 --> 00:11:11,360
SharePoint is where the documents live,

282
00:11:11,360 --> 00:11:13,320
and Outlook is where the priorities are set.

283
00:11:13,320 --> 00:11:15,600
This isn't a commentary on the quality of the software,

284
00:11:15,600 --> 00:11:18,160
but a recognition that the actual work of the enterprise

285
00:11:18,160 --> 00:11:19,960
happens inside the Microsoft ecosystem.

286
00:11:19,960 --> 00:11:21,560
When the work happens in Microsoft,

287
00:11:21,560 --> 00:11:24,000
the governance inevitably happens there as well.

288
00:11:24,000 --> 00:11:26,080
Approvals move through Power Automate workflows

289
00:11:26,080 --> 00:11:28,040
built in Power Apps and compliance boundaries

290
00:11:28,040 --> 00:11:29,240
are defined in PerView.

291
00:11:29,240 --> 00:11:31,200
An enterprise could choose to run every single bit

292
00:11:31,200 --> 00:11:33,440
of its compute on AWS, but the control plane

293
00:11:33,440 --> 00:11:34,800
would still belong to Microsoft.

294
00:11:34,800 --> 00:11:36,720
AWS owns the infrastructure underneath,

295
00:11:36,720 --> 00:11:39,480
but Microsoft owns the employee surface area

296
00:11:39,480 --> 00:11:41,160
where the business actually functions.

297
00:11:41,160 --> 00:11:43,720
The gravity compounds because it integrates identity

298
00:11:43,720 --> 00:11:47,120
with workflow, data, and compliance into a single engine.

299
00:11:47,120 --> 00:11:48,760
When Entra ID authenticates a user,

300
00:11:48,760 --> 00:11:50,800
it knows exactly who they are while teams

301
00:11:50,800 --> 00:11:53,160
sees what they are communicating and SharePoint sees

302
00:11:53,160 --> 00:11:54,280
what they are creating.

303
00:11:54,280 --> 00:11:56,880
PerView then classifies that data for protection

304
00:11:56,880 --> 00:11:59,680
while defender monitors the device risk profile.

305
00:11:59,680 --> 00:12:02,200
All of these signals flow into a single governance engine

306
00:12:02,200 --> 00:12:04,680
that AWS has no way to replicate.

307
00:12:04,680 --> 00:12:08,280
AWS has identity management and infrastructure security tools,

308
00:12:08,280 --> 00:12:10,680
but it does not own the space where the work is performed

309
00:12:10,680 --> 00:12:13,320
because it doesn't own the employee surface area.

310
00:12:13,320 --> 00:12:15,520
It cannot build this kind of unified governance

311
00:12:15,520 --> 00:12:17,880
or create this level of control plane gravity.

312
00:12:17,880 --> 00:12:20,480
This is why that 1 billion user figure actually matters.

313
00:12:20,480 --> 00:12:23,400
It is a statement about where the enterprise control plane lives

314
00:12:23,400 --> 00:12:25,360
and which identity engine is responsible

315
00:12:25,360 --> 00:12:28,040
for issuing the tokens that grant access to everything else.

316
00:12:28,040 --> 00:12:30,800
It tells you exactly who is defining the governance layer

317
00:12:30,800 --> 00:12:32,960
that sits on top of all your infrastructure.

318
00:12:32,960 --> 00:12:35,720
And that is Microsoft conditional access

319
00:12:35,720 --> 00:12:37,520
where policy follows identity.

320
00:12:37,520 --> 00:12:39,880
Conditional access is a Microsoft Entra ID feature

321
00:12:39,880 --> 00:12:41,840
that evaluates context in real time

322
00:12:41,840 --> 00:12:43,120
and understanding how this works

323
00:12:43,120 --> 00:12:45,040
is where the architectural difference between Azure

324
00:12:45,040 --> 00:12:47,080
and AWS becomes visceral.

325
00:12:47,080 --> 00:12:49,760
Imagine an employee signs in from the corporate office.

326
00:12:49,760 --> 00:12:52,680
Conditional access asks if the user is in a trusted location

327
00:12:52,680 --> 00:12:56,160
if their device is compliant and if their risk profile is elevated.

328
00:12:56,160 --> 00:12:57,760
When all signals are green,

329
00:12:57,760 --> 00:13:00,240
the system grants access without any friction.

330
00:13:00,240 --> 00:13:03,520
Everything changes when that same employee travels to a conference

331
00:13:03,520 --> 00:13:06,040
in another country and tries to access the same resource

332
00:13:06,040 --> 00:13:07,400
from a hotel.

333
00:13:07,400 --> 00:13:09,480
Conditional access asks the same questions,

334
00:13:09,480 --> 00:13:11,160
but now the location is untrusted

335
00:13:11,160 --> 00:13:14,120
and the risk profile is elevated due to impossible travel.

336
00:13:14,120 --> 00:13:15,880
The system does not just grant access,

337
00:13:15,880 --> 00:13:20,280
but instead enforces MFA or requires device management verification

338
00:13:20,280 --> 00:13:22,640
and it might even block access entirely depending

339
00:13:22,640 --> 00:13:24,560
on the sensitivity of the resource.

340
00:13:24,560 --> 00:13:26,720
This is not static role-based access control.

341
00:13:26,720 --> 00:13:29,440
In reality, it is dynamic, context-aware governance

342
00:13:29,440 --> 00:13:32,040
where the same user might have access to sensitive data

343
00:13:32,040 --> 00:13:34,000
from one location but find themselves blocked

344
00:13:34,000 --> 00:13:35,720
from that same data in another.

345
00:13:35,720 --> 00:13:38,000
The same device might be trusted in one scenario

346
00:13:38,000 --> 00:13:40,280
but flagged in another based on the risk profile

347
00:13:40,280 --> 00:13:42,560
and the same application might require MFA

348
00:13:42,560 --> 00:13:45,080
for one user while letting another pass through.

349
00:13:45,080 --> 00:13:47,240
AWS IAM provides roles and policies

350
00:13:47,240 --> 00:13:48,880
that are fundamentally static,

351
00:13:48,880 --> 00:13:52,120
meaning a user either has permission to access an S3 bucket

352
00:13:52,120 --> 00:13:53,240
or they do not.

353
00:13:53,240 --> 00:13:56,040
You can attach a policy that says a user can read objects

354
00:13:56,040 --> 00:13:57,880
but that policy applies everywhere

355
00:13:57,880 --> 00:14:00,080
and always without any context evaluation

356
00:14:00,080 --> 00:14:01,480
or continuous verification.

357
00:14:01,480 --> 00:14:04,240
There is no mechanism to say that access is allowed from here

358
00:14:04,240 --> 00:14:05,120
but not from there.

359
00:14:05,120 --> 00:14:07,320
AWS uses guard duty for threat detection

360
00:14:07,320 --> 00:14:09,160
and security hub for aggregation

361
00:14:09,160 --> 00:14:10,520
but these are detective controls

362
00:14:10,520 --> 00:14:12,360
that tell you what went wrong after the fact.

363
00:14:12,360 --> 00:14:14,840
They do not prevent access before a breach occurs

364
00:14:14,840 --> 00:14:17,280
whereas conditional access is a preventive mechanism

365
00:14:17,280 --> 00:14:20,280
that stops unauthorized access from happening in the first place.

366
00:14:20,280 --> 00:14:23,000
This distinction matters enormously in hybrid environments

367
00:14:23,000 --> 00:14:25,400
where an employee at a coffee shop gets different treatment

368
00:14:25,400 --> 00:14:27,280
than they would at the corporate office.

369
00:14:27,280 --> 00:14:29,720
Accessing a cloud application from a compliant device

370
00:14:29,720 --> 00:14:32,360
results in a different outcome than using a personal device

371
00:14:32,360 --> 00:14:35,320
and signing in from an approved country is treated differently

372
00:14:35,320 --> 00:14:37,720
than signing in from a high-risk region.

373
00:14:37,720 --> 00:14:41,080
AWS has no native equivalent to this architectural pattern

374
00:14:41,080 --> 00:14:43,920
while AWS can log the access alert on anomalies

375
00:14:43,920 --> 00:14:45,800
or revoke credentials after the fact

376
00:14:45,800 --> 00:14:48,320
it cannot prevent the access before it happens

377
00:14:48,320 --> 00:14:49,840
based on real-time context.

378
00:14:49,840 --> 00:14:51,480
This becomes critical for the control plane

379
00:14:51,480 --> 00:14:54,520
because when enter ID federates AWS conditional access

380
00:14:54,520 --> 00:14:55,800
travels with the identity

381
00:14:55,800 --> 00:14:58,480
an organization can set a rule requiring MFA

382
00:14:58,480 --> 00:15:01,400
for all AWS access from outside the network

383
00:15:01,400 --> 00:15:03,480
and that rule applies to every federated user

384
00:15:03,480 --> 00:15:06,960
regardless of which AWS account or service they are using.

385
00:15:06,960 --> 00:15:09,320
This creates one policy for multiple platforms

386
00:15:09,320 --> 00:15:10,640
under one control plane.

387
00:15:10,640 --> 00:15:12,840
Microsoft Defender for Cloud amplifies this

388
00:15:12,840 --> 00:15:16,680
by monitoring as your resources and connecting to AWS workloads

389
00:15:16,680 --> 00:15:17,520
at the same time.

390
00:15:17,520 --> 00:15:19,640
When a security incident occurs in AWS

391
00:15:19,640 --> 00:15:22,640
the response flows through Microsoft's compliance engine

392
00:15:22,640 --> 00:15:25,920
which evaluates the incident against organizational policies

393
00:15:25,920 --> 00:15:27,520
and enforces remediation.

394
00:15:27,520 --> 00:15:29,760
AWS remains the infrastructure provider

395
00:15:29,760 --> 00:15:31,520
but Microsoft controls the response.

396
00:15:31,520 --> 00:15:33,800
The control plane finally becomes visible here.

397
00:15:33,800 --> 00:15:35,400
It is not just about authentication

398
00:15:35,400 --> 00:15:37,800
but about authorization that adapts to context

399
00:15:37,800 --> 00:15:40,480
and policy that travels with identity across environments.

400
00:15:40,480 --> 00:15:41,920
This is continuous verification

401
00:15:41,920 --> 00:15:43,600
instead of one time authentication.

402
00:15:43,600 --> 00:15:46,720
AWS Security Hub attempts to aggregate security signals

403
00:15:46,720 --> 00:15:48,880
into a dashboard to show you what is happening

404
00:15:48,880 --> 00:15:51,000
but it does not govern identity across platforms

405
00:15:51,000 --> 00:15:53,640
or enforce policy or non-AWS infrastructure.

406
00:15:53,640 --> 00:15:55,200
Security Hub is a security tool

407
00:15:55,200 --> 00:15:57,800
while the combination of conditional access and defender

408
00:15:57,800 --> 00:15:58,880
is a governance layer.

409
00:15:58,880 --> 00:16:01,240
One is a service, one is a control mechanism.

410
00:16:01,240 --> 00:16:03,000
In the enterprise the control mechanism

411
00:16:03,000 --> 00:16:06,600
is what determines who actually has access to what.

412
00:16:06,600 --> 00:16:09,400
Defender for Cloud, the multi-cloud control plane.

413
00:16:09,400 --> 00:16:12,640
Microsoft Defender for Cloud acts as a single pane of glass

414
00:16:12,640 --> 00:16:15,360
for security across multiple environments

415
00:16:15,360 --> 00:16:18,800
covering Azure infrastructure, AWS workloads,

416
00:16:18,800 --> 00:16:23,280
Google Cloud resources and on-premises servers via Azure Arc.

417
00:16:23,280 --> 00:16:26,360
It also integrates endpoints through Defender for Endpoint,

418
00:16:26,360 --> 00:16:31,040
identity through Entra ID and Data through Microsoft purview.

419
00:16:31,040 --> 00:16:32,680
This is not just a feature list

420
00:16:32,680 --> 00:16:34,320
but an architectural inversion.

421
00:16:34,320 --> 00:16:37,040
AWS Security Hub attempts something similar

422
00:16:37,040 --> 00:16:39,680
by aggregating AWS Security signals

423
00:16:39,680 --> 00:16:41,760
to show you what is happening in your environment

424
00:16:41,760 --> 00:16:43,040
which is certainly useful.

425
00:16:43,040 --> 00:16:45,120
However, Security Hub does not govern identity

426
00:16:45,120 --> 00:16:48,400
across platforms or enforce policy on non-AWS infrastructure

427
00:16:48,400 --> 00:16:50,040
making it a dashboard that tells you

428
00:16:50,040 --> 00:16:53,000
what went wrong rather than a system that prevents it.

429
00:16:53,000 --> 00:16:55,600
The foundational mistake is thinking these are equivalent.

430
00:16:55,600 --> 00:16:57,800
When a security incident occurs in AWS,

431
00:16:57,800 --> 00:17:00,240
the response flows through Microsoft's compliance engine

432
00:17:00,240 --> 00:17:02,360
instead of the AWS engine allowing Defender

433
00:17:02,360 --> 00:17:05,120
to evaluate the incident against organizational policies

434
00:17:05,120 --> 00:17:06,760
and enforce remediation.

435
00:17:06,760 --> 00:17:10,000
AWS provides the platform but Microsoft provides the governance

436
00:17:10,000 --> 00:17:11,920
and that is control plane dominance.

437
00:17:11,920 --> 00:17:14,240
Consider what this means for daily operations.

438
00:17:14,240 --> 00:17:17,400
An organization with workloads on AWS, Azure,

439
00:17:17,400 --> 00:17:20,040
on-premises servers and edge devices

440
00:17:20,040 --> 00:17:22,600
would traditionally need five different security tools

441
00:17:22,600 --> 00:17:24,120
and five different alert systems.

442
00:17:24,120 --> 00:17:26,160
That creates chaos and security debt

443
00:17:26,160 --> 00:17:28,600
and it is the primary reason most organizations fail

444
00:17:28,600 --> 00:17:30,240
to respond to incidents quickly.

445
00:17:30,240 --> 00:17:33,200
Defender for Cloud centralizes the signal into one dashboard

446
00:17:33,200 --> 00:17:34,840
with one remediation workflow.

447
00:17:34,840 --> 00:17:37,280
So an unauthorized access attempt in AWS triggers

448
00:17:37,280 --> 00:17:39,400
the same response as one in Azure.

449
00:17:39,400 --> 00:17:42,800
The same policy applies and the same escalation process activates,

450
00:17:42,800 --> 00:17:44,760
creating one control plane that governs

451
00:17:44,760 --> 00:17:46,840
multiple platforms simultaneously.

452
00:17:46,840 --> 00:17:49,960
AWS lacks an equivalent because it does not own the identity

453
00:17:49,960 --> 00:17:52,040
layer whereas Defender for Cloud works

454
00:17:52,040 --> 00:17:54,720
because it sits directly on top of identity.

455
00:17:54,720 --> 00:17:57,120
When Enter ID authenticates a user, Defender

456
00:17:57,120 --> 00:17:59,720
knows exactly who they are and monitors their access

457
00:17:59,720 --> 00:18:01,880
to AWS resources in real time.

458
00:18:01,880 --> 00:18:04,520
When anomalies occur, Defender evaluates them

459
00:18:04,520 --> 00:18:07,720
against organizational policy and enforces remediation

460
00:18:07,720 --> 00:18:09,200
through a single governance engine.

461
00:18:09,200 --> 00:18:12,640
You can integrate AWS security hub with third party tools

462
00:18:12,640 --> 00:18:14,880
or automate responses via Lambda,

463
00:18:14,880 --> 00:18:17,400
but you are essentially building a governance layer

464
00:18:17,400 --> 00:18:19,480
on top of infrastructure from scratch.

465
00:18:19,480 --> 00:18:21,120
You are not inheriting a governance layer

466
00:18:21,120 --> 00:18:22,760
from a unified identity platform

467
00:18:22,760 --> 00:18:25,680
but rather constructing one from individual components.

468
00:18:25,680 --> 00:18:28,520
This matters at scale when you have hundreds of AWS accounts

469
00:18:28,520 --> 00:18:30,480
and millions of access events per day

470
00:18:30,480 --> 00:18:33,440
making a unified governance layer an operational necessity.

471
00:18:33,440 --> 00:18:37,440
You cannot manually review every alert or enforce every policy

472
00:18:37,440 --> 00:18:39,960
so you need a system that understands context

473
00:18:39,960 --> 00:18:42,240
and uses intelligence to manage the load.

474
00:18:42,240 --> 00:18:44,040
Defender for Cloud understands context

475
00:18:44,040 --> 00:18:45,800
because it is built on identity

476
00:18:45,800 --> 00:18:48,000
meaning it knows the user, their device,

477
00:18:48,000 --> 00:18:50,320
their location and their historical behavior.

478
00:18:50,320 --> 00:18:52,920
When anomalies occur, Defender does not just flag them

479
00:18:52,920 --> 00:18:54,600
but instead contextualizes them

480
00:18:54,600 --> 00:18:57,360
and enforces policy based on that specific context.

481
00:18:57,360 --> 00:18:59,760
AWS security hub does not have this context

482
00:18:59,760 --> 00:19:01,880
because it sees infrastructure events

483
00:19:01,880 --> 00:19:03,200
rather than identity events.

484
00:19:03,200 --> 00:19:05,120
It sees that an access event happened

485
00:19:05,120 --> 00:19:07,200
but it does not see the identity context,

486
00:19:07,200 --> 00:19:10,520
the device compliance or the risk profile of the user involved.

487
00:19:10,520 --> 00:19:12,240
This is why the control plane matters.

488
00:19:12,240 --> 00:19:13,440
Infrastructure is visible

489
00:19:13,440 --> 00:19:16,000
but identity remains invisible until something goes wrong

490
00:19:16,000 --> 00:19:18,920
and Defender for Cloud is what finally makes identity

491
00:19:18,920 --> 00:19:21,840
and policy enforcement visible across every platform.

492
00:19:21,840 --> 00:19:23,760
AWS will likely continue to dominate

493
00:19:23,760 --> 00:19:26,160
in raw infrastructure scale and offer more services

494
00:19:26,160 --> 00:19:27,560
than any other competitor.

495
00:19:27,560 --> 00:19:30,200
However, AWS will not control the governance layer

496
00:19:30,200 --> 00:19:31,880
that sits on top of that infrastructure

497
00:19:31,880 --> 00:19:33,560
as that layer belongs to Microsoft.

498
00:19:33,560 --> 00:19:36,400
That layer is where enterprise security actually lives

499
00:19:36,400 --> 00:19:38,920
where policy is enforced and where compliance is proven.

500
00:19:38,920 --> 00:19:40,200
That is the control plane

501
00:19:40,200 --> 00:19:42,920
and that is where the enterprise battle is being decided.

502
00:19:42,920 --> 00:19:45,520
Sentinel and PerView compliance as control.

503
00:19:45,520 --> 00:19:48,400
Microsoft Sentinel is often described as a SIEM,

504
00:19:48,400 --> 00:19:51,800
a tool that simply ingests logs from AWS, Azure

505
00:19:51,800 --> 00:19:53,640
and your on-premises SAS applications

506
00:19:53,640 --> 00:19:54,800
to centralize the signal.

507
00:19:54,800 --> 00:19:57,840
Most organizations believe it is just a high-end log aggregator

508
00:19:57,840 --> 00:20:00,600
where you can see everything happening across your infrastructure.

509
00:20:00,600 --> 00:20:01,480
They are wrong.

510
00:20:01,480 --> 00:20:03,880
Architecturally, Sentinel is the compliance backbone

511
00:20:03,880 --> 00:20:05,760
where policy enforcement becomes visible

512
00:20:05,760 --> 00:20:08,080
and governance finally becomes auditable.

513
00:20:08,080 --> 00:20:10,600
Microsoft PerView sits directly on top of that signal

514
00:20:10,600 --> 00:20:12,720
to add a layer of compliance governance

515
00:20:12,720 --> 00:20:15,000
that the underlying infrastructure cannot provide.

516
00:20:15,000 --> 00:20:18,040
PerView is the engine that enforces data classification,

517
00:20:18,040 --> 00:20:19,720
manages retention policies

518
00:20:19,720 --> 00:20:23,080
and handles the complexities of e-discovery and insider risk.

519
00:20:23,080 --> 00:20:26,040
Because it enforces data loss prevention across teams,

520
00:20:26,040 --> 00:20:27,720
sharepoint and exchange,

521
00:20:27,720 --> 00:20:29,680
you are looking at a single governance engine

522
00:20:29,680 --> 00:20:32,760
that dictates behavior across multiple platforms.

523
00:20:32,760 --> 00:20:35,800
Consider the operational reality of proving GDPR compliance

524
00:20:35,800 --> 00:20:39,080
to a regulator who demands to see how you manage sensitive data.

525
00:20:39,080 --> 00:20:41,640
You need to demonstrate exactly where that data lives,

526
00:20:41,640 --> 00:20:44,160
who touched it and what happened to that information

527
00:20:44,160 --> 00:20:46,280
the moment an employee left the company.

528
00:20:46,280 --> 00:20:48,160
The traditional approach involves auditing

529
00:20:48,160 --> 00:20:50,480
five different systems with five different frameworks

530
00:20:50,480 --> 00:20:52,760
resulting in months of work and thousands of dollars

531
00:20:52,760 --> 00:20:55,040
spent on a fragmented audit trail.

532
00:20:55,040 --> 00:20:57,920
The Sentinel and PerView approach replaces that chaos

533
00:20:57,920 --> 00:21:00,520
with a unified audit trail and a single dashboard

534
00:21:00,520 --> 00:21:02,880
to prove consistent policy enforcement.

535
00:21:02,880 --> 00:21:04,680
When a document is classified as sensitive,

536
00:21:04,680 --> 00:21:07,440
PerView recognizes the state, Sentinel logs the access

537
00:21:07,440 --> 00:21:10,120
and DLP blocks any attempt to share it externally.

538
00:21:10,120 --> 00:21:12,920
This is a deterministic model where the document owner's departure

539
00:21:12,920 --> 00:21:14,760
triggers an automatic retention policy,

540
00:21:14,760 --> 00:21:17,600
providing one version of the truth for your compliance proof.

541
00:21:17,600 --> 00:21:19,600
AWS has no functionally equivalent to this

542
00:21:19,600 --> 00:21:23,040
because AWS config is limited to infrastructure compliance

543
00:21:23,040 --> 00:21:24,400
rather than data governance.

544
00:21:24,400 --> 00:21:27,680
While AWS config can tell you if an estri bucket is encrypted

545
00:21:27,680 --> 00:21:30,040
or if an EC2 instance is configured correctly,

546
00:21:30,040 --> 00:21:32,880
it cannot manage a retention policy or enforce DLP.

547
00:21:32,880 --> 00:21:34,720
AWS provides the virtual hardware

548
00:21:34,720 --> 00:21:36,960
but Microsoft provides the compliance layer

549
00:21:36,960 --> 00:21:39,880
and in regulated industries like finance or healthcare,

550
00:21:39,880 --> 00:21:42,240
that layer is the only thing that matters.

551
00:21:42,240 --> 00:21:44,400
When an enterprise needs to prove hyper compliance,

552
00:21:44,400 --> 00:21:45,960
they don't look to their cloud provider,

553
00:21:45,960 --> 00:21:47,480
they look to their compliance officer.

554
00:21:47,480 --> 00:21:50,960
That officer uses PerView to classify data and enter ID

555
00:21:50,960 --> 00:21:53,920
to manage identity because that is where the control plane

556
00:21:53,920 --> 00:21:54,960
actually lives.

557
00:21:54,960 --> 00:21:57,120
The infrastructure has become a commodity

558
00:21:57,120 --> 00:21:59,720
but the ability to prove that a policy was enforced

559
00:21:59,720 --> 00:22:01,360
is the ultimate differentiator.

560
00:22:01,360 --> 00:22:04,160
This is why enterprises standardize on Microsoft

561
00:22:04,160 --> 00:22:06,800
for their most sensitive regulated workloads.

562
00:22:06,800 --> 00:22:09,680
It is not because Azure Infrastructure is inherently superior

563
00:22:09,680 --> 00:22:12,520
to AWS or because the services have more features,

564
00:22:12,520 --> 00:22:15,080
it is because Microsoft owns the audit trail

565
00:22:15,080 --> 00:22:16,360
and the proof of enforcement.

566
00:22:16,360 --> 00:22:18,880
Even when an organization runs a workload on AWS,

567
00:22:18,880 --> 00:22:20,880
they still extend PerView and Sentinel

568
00:22:20,880 --> 00:22:22,880
across that environment to maintain control.

569
00:22:22,880 --> 00:22:24,360
That is the control plane at work.

570
00:22:24,360 --> 00:22:27,400
AWS provides the workload but Microsoft provides the governance

571
00:22:27,400 --> 00:22:29,400
that makes that workload legal to operate.

572
00:22:29,400 --> 00:22:31,240
In the world of enterprise IT,

573
00:22:31,240 --> 00:22:33,080
control is what the regulators demand

574
00:22:33,080 --> 00:22:34,640
and what the organization pays for.

575
00:22:34,640 --> 00:22:36,680
The battle for the enterprise is not being decided

576
00:22:36,680 --> 00:22:38,200
by cost per compute hour

577
00:22:38,200 --> 00:22:39,880
but by the ability to enforce policy

578
00:22:39,880 --> 00:22:41,960
consistently across every platform.

579
00:22:41,960 --> 00:22:44,080
AWS will never win this specific battle

580
00:22:44,080 --> 00:22:46,880
because they do not own the identity foundation.

581
00:22:46,880 --> 00:22:49,000
Without identity you can build security tools

582
00:22:49,000 --> 00:22:50,360
and monitoring systems

583
00:22:50,360 --> 00:22:52,320
but you cannot build a true governance layer.

584
00:22:52,320 --> 00:22:54,880
Governance requires a deterministic identity model

585
00:22:54,880 --> 00:22:55,920
as its starting point

586
00:22:55,920 --> 00:22:58,240
and that identity belongs to Microsoft.

587
00:22:58,240 --> 00:23:02,120
The M365 Gravity Well, where enterprise work happens.

588
00:23:02,120 --> 00:23:05,760
Over 95% of Fortune 500 companies use Microsoft 365

589
00:23:05,760 --> 00:23:08,240
a number that represents where the actual work

590
00:23:08,240 --> 00:23:09,920
of the enterprise occurs.

591
00:23:09,920 --> 00:23:12,640
This isn't just about IT mandates or licensing bundles,

592
00:23:12,640 --> 00:23:15,240
it's about where the organizational memory is stored

593
00:23:15,240 --> 00:23:17,080
and where decisions are documented.

594
00:23:17,080 --> 00:23:18,960
Teams is no longer just a chat app.

595
00:23:18,960 --> 00:23:20,480
It is the virtual conference room

596
00:23:20,480 --> 00:23:22,000
where executives make the choices

597
00:23:22,000 --> 00:23:23,760
that shape the company's future.

598
00:23:23,760 --> 00:23:25,680
SharePoint has replaced the file server

599
00:23:25,680 --> 00:23:27,600
as the place where every governed document

600
00:23:27,600 --> 00:23:29,320
lives stays or eventually dies.

601
00:23:29,320 --> 00:23:30,480
When a file needs to be discovered

602
00:23:30,480 --> 00:23:33,120
during litigation or deleted according to a legal hold

603
00:23:33,120 --> 00:23:35,120
it happens within the SharePoint architecture.

604
00:23:35,120 --> 00:23:37,840
Exchange serves a similar role for communication,

605
00:23:37,840 --> 00:23:40,640
acting as the permanent archive that regulators check

606
00:23:40,640 --> 00:23:43,400
when they need to see who knew what and when they knew it.

607
00:23:43,400 --> 00:23:45,400
We are not discussing the subjective quality

608
00:23:45,400 --> 00:23:47,640
of these products or whether teams is better

609
00:23:47,640 --> 00:23:48,880
than slack in a vacuum.

610
00:23:48,880 --> 00:23:50,640
The reality is one of ubiquity

611
00:23:50,640 --> 00:23:52,400
where the actual work of the enterprise happens

612
00:23:52,400 --> 00:23:54,480
inside the Microsoft 365 ecosystem.

613
00:23:54,480 --> 00:23:55,800
Because the work happens there,

614
00:23:55,800 --> 00:23:57,440
the governance must happen there as well

615
00:23:57,440 --> 00:24:00,040
making the two concepts architecturally inseparable.

616
00:24:00,040 --> 00:24:01,400
Every approval that flows through power

617
00:24:01,400 --> 00:24:04,040
automate relies on EntraID to know who the approver is

618
00:24:04,040 --> 00:24:06,200
and conditional access to check their context.

619
00:24:06,200 --> 00:24:08,040
Sentinel watches the entire process,

620
00:24:08,040 --> 00:24:10,440
logging the approval to ensure the workflow remains

621
00:24:10,440 --> 00:24:12,920
compliant with the organization's stated intent.

622
00:24:12,920 --> 00:24:14,280
You are not just using a tool,

623
00:24:14,280 --> 00:24:16,120
you are operating within a policy layer

624
00:24:16,120 --> 00:24:19,040
that governs the entire lifecycle of an action.

625
00:24:19,040 --> 00:24:21,080
Custom applications built in PowerApps

626
00:24:21,080 --> 00:24:23,280
follow the same logic by authenticating users

627
00:24:23,280 --> 00:24:26,040
through EntraID and enforcing roles defined

628
00:24:26,040 --> 00:24:27,600
in the identity platform.

629
00:24:27,600 --> 00:24:28,760
When a document is created,

630
00:24:28,760 --> 00:24:30,280
Perview classifies it immediately

631
00:24:30,280 --> 00:24:32,320
and DLP prevents it from leaving the boundaries

632
00:24:32,320 --> 00:24:33,440
of the organization.

633
00:24:33,440 --> 00:24:36,440
This integrated governance means that even if your compute

634
00:24:36,440 --> 00:24:39,800
lives on AWS, your control plane is still firmly rooted

635
00:24:39,800 --> 00:24:40,920
in Microsoft.

636
00:24:40,920 --> 00:24:43,720
AWS does not own the employee surface area

637
00:24:43,720 --> 00:24:46,760
which means they cannot build this type of integrated governance.

638
00:24:46,760 --> 00:24:48,080
This is the gravity well.

639
00:24:48,080 --> 00:24:51,120
Work happens in M365 identity flows through Entra

640
00:24:51,120 --> 00:24:53,520
and policies enforced by conditional access.

641
00:24:53,520 --> 00:24:55,360
All of these signals flow into Sentinel

642
00:24:55,360 --> 00:24:56,880
creating a unified control plane

643
00:24:56,880 --> 00:25:00,240
that AWS simply cannot replicate from the infrastructure layer.

644
00:25:00,240 --> 00:25:04,600
An enterprise might choose AWS for 80% of its raw compute power

645
00:25:04,600 --> 00:25:07,760
but they remain 100% Microsoft by governance and control.

646
00:25:07,760 --> 00:25:09,600
They rely on Microsoft for the place

647
00:25:09,600 --> 00:25:12,720
where decisions are made, archived and eventually audited.

648
00:25:12,720 --> 00:25:15,560
AWS can provide the storage and the AI infrastructure

649
00:25:15,560 --> 00:25:18,560
but they cannot provide the layer that makes that work auditable.

650
00:25:18,560 --> 00:25:20,400
That distinction matters because it defines

651
00:25:20,400 --> 00:25:22,680
who actually owns the enterprise relationship.

652
00:25:22,680 --> 00:25:25,280
The gravity well ensures that as long as work happens

653
00:25:25,280 --> 00:25:27,960
in the Microsoft suite, the governance will follow.

654
00:25:27,960 --> 00:25:30,480
Microsoft owns the place where work happens

655
00:25:30,480 --> 00:25:32,280
and that is why the control plane belongs to them

656
00:25:32,280 --> 00:25:34,840
regardless of where the servers are located.

657
00:25:34,840 --> 00:25:36,960
Co-pilot is control plane acceleration.

658
00:25:36,960 --> 00:25:40,760
Microsoft co-pilot for Microsoft 365 is not merely an AI feature

659
00:25:40,760 --> 00:25:42,520
but rather a governance accelerator

660
00:25:42,520 --> 00:25:45,480
that makes the control plane narrative impossible to ignore.

661
00:25:45,480 --> 00:25:47,600
To function safely within an enterprise environment,

662
00:25:47,600 --> 00:25:50,280
co-pilot requires specific architectural foundations

663
00:25:50,280 --> 00:25:53,160
like data classification, identity scoping

664
00:25:53,160 --> 00:25:55,200
and rigid compliance boundaries.

665
00:25:55,200 --> 00:25:58,320
Without these guardrails, the system cannot operate reliably

666
00:25:58,320 --> 00:26:01,160
and the tool quickly transforms from a productivity asset

667
00:26:01,160 --> 00:26:02,800
into a massive liability.

668
00:26:02,800 --> 00:26:04,800
Consider the actual behavior of the system

669
00:26:04,800 --> 00:26:07,120
as it reads your emails, scans your documents

670
00:26:07,120 --> 00:26:09,080
and synthesizes your entire chat history

671
00:26:09,080 --> 00:26:10,800
into automated insights.

672
00:26:10,800 --> 00:26:12,960
This process becomes a data breach

673
00:26:12,960 --> 00:26:15,360
waiting to happen if the engine lacks the context

674
00:26:15,360 --> 00:26:17,400
to know which documents are sensitive

675
00:26:17,400 --> 00:26:20,280
or which regulated data must remain siloed.

676
00:26:20,280 --> 00:26:22,600
Because the system lacks inherent intent,

677
00:26:22,600 --> 00:26:24,680
it will process whatever it can reach,

678
00:26:24,680 --> 00:26:26,760
making the underlying authorization graph

679
00:26:26,760 --> 00:26:29,360
the only thing standing between utility and catastrophe.

680
00:26:29,360 --> 00:26:31,760
This reality forces organizations to strengthen

681
00:26:31,760 --> 00:26:34,400
their control plane before they can even begin a deployment.

682
00:26:34,400 --> 00:26:35,720
You find yourself needing purview

683
00:26:35,720 --> 00:26:38,640
to classify the data and DLP to enforce boundaries

684
00:26:38,640 --> 00:26:40,320
while enter ID scopes access,

685
00:26:40,320 --> 00:26:43,200
based on the specific role and context of the user.

686
00:26:43,200 --> 00:26:46,040
To maintain oversight, you then need Sentinel to audit

687
00:26:46,040 --> 00:26:48,560
what the engine is reading alongside conditional access

688
00:26:48,560 --> 00:26:51,080
to ensure that only authorized actors can trigger

689
00:26:51,080 --> 00:26:52,040
these features.

690
00:26:52,040 --> 00:26:53,560
Enterprises are moving toward co-pilot

691
00:26:53,560 --> 00:26:55,120
because the productivity gains are real,

692
00:26:55,120 --> 00:26:57,840
but they are finding that adoption is not governance optional.

693
00:26:57,840 --> 00:26:59,240
You cannot deploy this technology

694
00:26:59,240 --> 00:27:01,040
without first hardening your governance layer

695
00:27:01,040 --> 00:27:02,360
which creates a functional lock-in

696
00:27:02,360 --> 00:27:04,920
that is rarely discussed in marketing materials.

697
00:27:04,920 --> 00:27:07,560
While AWS offers bedrock as a service for hosting

698
00:27:07,560 --> 00:27:09,000
and fine-tuning models,

699
00:27:09,000 --> 00:27:10,840
it remains a piece of infrastructure

700
00:27:10,840 --> 00:27:12,320
rather than a control mechanism.

701
00:27:12,320 --> 00:27:14,640
Bedrock is a substrate that allows you to run models

702
00:27:14,640 --> 00:27:15,480
however you like,

703
00:27:15,480 --> 00:27:18,280
but it does not mandate that you classify your data

704
00:27:18,280 --> 00:27:20,480
or implement identity governance to function.

705
00:27:20,480 --> 00:27:22,760
Co-pilot is different because it is architecturally

706
00:27:22,760 --> 00:27:24,400
inseparable from governance.

707
00:27:24,400 --> 00:27:26,720
It forces you to confront your access management

708
00:27:26,720 --> 00:27:30,120
and audit trails because the alternative is conditional chaos

709
00:27:30,120 --> 00:27:32,600
within your most sensitive data sets.

710
00:27:32,600 --> 00:27:34,520
As organizations adopt these tools,

711
00:27:34,520 --> 00:27:36,160
they aren't just buying AI.

712
00:27:36,160 --> 00:27:38,120
They are deepening their structural dependence

713
00:27:38,120 --> 00:27:39,640
on Microsoft's governance stack.

714
00:27:39,640 --> 00:27:41,800
Every query and every recommendation makes

715
00:27:41,800 --> 00:27:45,320
Entra ID and purview more essential to daily operations,

716
00:27:45,320 --> 00:27:48,000
turning these security tools into the literal heartbeat

717
00:27:48,000 --> 00:27:49,040
of the business.

718
00:27:49,040 --> 00:27:50,960
AWS cannot replicate this dynamic

719
00:27:50,960 --> 00:27:53,400
because they do not own the employee surface area

720
00:27:53,400 --> 00:27:54,760
where work actually happens.

721
00:27:54,760 --> 00:27:57,200
Co-pilot succeeds because it lives inside teams outlook

722
00:27:57,200 --> 00:27:58,160
and SharePoint,

723
00:27:58,160 --> 00:28:00,720
whereas AWS lacks the hooks into the daily workflow

724
00:28:00,720 --> 00:28:02,800
to force this kind of governance hardening.

725
00:28:02,800 --> 00:28:05,920
They can host the models and provide the raw inference power,

726
00:28:05,920 --> 00:28:08,640
but they cannot create a feature that accelerates the control

727
00:28:08,640 --> 00:28:10,520
plane because they do not own the interface.

728
00:28:10,520 --> 00:28:13,680
This isn't a coercive tactic, but a functional reality

729
00:28:13,680 --> 00:28:16,440
where the Microsoft control plane becomes more valuable

730
00:28:16,440 --> 00:28:17,480
the more you use it.

731
00:28:17,480 --> 00:28:20,560
Once this layer becomes critical to your operations,

732
00:28:20,560 --> 00:28:23,800
the cost of switching to another provider becomes astronomical.

733
00:28:23,800 --> 00:28:26,800
Removing Entra ID or purview would mean dismantling

734
00:28:26,800 --> 00:28:29,320
your entire identity and data governance framework,

735
00:28:29,320 --> 00:28:30,840
leaving you with a security vacuum

736
00:28:30,840 --> 00:28:32,600
that is nearly impossible to fill.

737
00:28:32,600 --> 00:28:34,640
Choosing Co-pilot is a strategic decision

738
00:28:34,640 --> 00:28:37,560
to prioritize the governance layer over the infrastructure layer

739
00:28:37,560 --> 00:28:40,960
eventually making the underlying hardware irrelevant.

740
00:28:40,960 --> 00:28:43,840
Azure Arc, managing everything everywhere.

741
00:28:43,840 --> 00:28:46,800
Azure Arc represents the software-defined control plane

742
00:28:46,800 --> 00:28:48,080
for hybrid infrastructure,

743
00:28:48,080 --> 00:28:50,040
serving as the most tangible example

744
00:28:50,040 --> 00:28:52,960
of the architectural inversion I've been describing.

745
00:28:52,960 --> 00:28:55,920
It allows you to project a Azure policy and defender

746
00:28:55,920 --> 00:28:58,320
onto infrastructure you don't even own,

747
00:28:58,320 --> 00:29:01,880
including on-premises servers and AWS EC2 instances.

748
00:29:01,880 --> 00:29:03,360
By installing a lightweight agent,

749
00:29:03,360 --> 00:29:06,240
these external resources appear in your Azure portal

750
00:29:06,240 --> 00:29:09,400
as managed objects, effectively pulling your competitors hardware

751
00:29:09,400 --> 00:29:10,800
into your own governance model.

752
00:29:10,800 --> 00:29:12,360
This is not an extension of infrastructure,

753
00:29:12,360 --> 00:29:14,000
but a projection of policy.

754
00:29:14,000 --> 00:29:16,680
While AWS Outpost tries to solve the hybrid problem

755
00:29:16,680 --> 00:29:19,600
by putting AWS Managed Hardware in your data center,

756
00:29:19,600 --> 00:29:22,400
it keeps you trapped inside their specific APIs

757
00:29:22,400 --> 00:29:23,680
and hardware lifecycle.

758
00:29:23,680 --> 00:29:25,960
Outposts is a hardware play that locks you

759
00:29:25,960 --> 00:29:27,680
into a specific vendor's metal,

760
00:29:27,680 --> 00:29:31,960
whereas Arc is a software play that abstracts the hardware entirely.

761
00:29:31,960 --> 00:29:33,640
In the enterprise software, always wins

762
00:29:33,640 --> 00:29:36,360
because that is where the actual control of the system lives.

763
00:29:36,360 --> 00:29:39,840
When you install the Arc agent on a legacy on-premises server,

764
00:29:39,840 --> 00:29:42,720
that machine suddenly behaves like a native Azure resource.

765
00:29:42,720 --> 00:29:44,320
You can enforce security baselines,

766
00:29:44,320 --> 00:29:46,080
require specific encryption standards

767
00:29:46,080 --> 00:29:48,800
and manage firewall rules through the same policy engine

768
00:29:48,800 --> 00:29:50,560
that governs your cloud footprint.

769
00:29:50,560 --> 00:29:53,320
The same logic applies to your AWS instances,

770
00:29:53,320 --> 00:29:55,480
allowing you to monitor them with Azure Monitor

771
00:29:55,480 --> 00:29:58,760
and protect them with Defender under a single unified framework.

772
00:29:58,760 --> 00:30:01,080
This is the definition of control plane abstraction.

773
00:30:01,080 --> 00:30:04,040
You are essentially stating that the location of the infrastructure

774
00:30:04,040 --> 00:30:06,400
is irrelevant as long as the policy is enforced

775
00:30:06,400 --> 00:30:08,760
consistently across the entire environment.

776
00:30:08,760 --> 00:30:10,720
AWS cannot offer a true equivalent

777
00:30:10,720 --> 00:30:13,840
because their DNA is fundamentally infrastructure focused,

778
00:30:13,840 --> 00:30:16,160
meaning they excel at managing their own hardware,

779
00:30:16,160 --> 00:30:18,320
but struggle to provide a unified governance layer

780
00:30:18,320 --> 00:30:20,320
for their competitors platforms.

781
00:30:20,320 --> 00:30:22,640
Arc treats infrastructure as a mere substrate,

782
00:30:22,640 --> 00:30:24,720
allowing the governance layer to remain constant

783
00:30:24,720 --> 00:30:26,760
while the hardware becomes interchangeable.

784
00:30:26,760 --> 00:30:29,440
For an enterprise with a messy mix of on-premises workloads

785
00:30:29,440 --> 00:30:31,680
and multi-cloud deployments, this solves the problem

786
00:30:31,680 --> 00:30:32,800
of operational chaos.

787
00:30:32,800 --> 00:30:35,360
Instead of juggling three different management frameworks

788
00:30:35,360 --> 00:30:36,840
and three different sets of dashboards,

789
00:30:36,840 --> 00:30:38,600
you move toward a single compliance engine

790
00:30:38,600 --> 00:30:41,240
where Azure Policy applies everywhere.

791
00:30:41,240 --> 00:30:43,120
This shift represents a fundamental change

792
00:30:43,120 --> 00:30:44,800
in how we design systems.

793
00:30:44,800 --> 00:30:46,640
You no longer choose a hardware provider

794
00:30:46,640 --> 00:30:48,640
and then try to figure out how to secure it.

795
00:30:48,640 --> 00:30:50,440
Instead, you choose a governance framework

796
00:30:50,440 --> 00:30:52,080
and then decide which infrastructure

797
00:30:52,080 --> 00:30:53,520
fits within those rules.

798
00:30:53,520 --> 00:30:55,400
Microsoft built this abstraction layer

799
00:30:55,400 --> 00:30:57,120
while AWS was still focused

800
00:30:57,120 --> 00:30:58,960
on building better virtual machines.

801
00:30:58,960 --> 00:31:01,400
And that distinction in architectural philosophy

802
00:31:01,400 --> 00:31:04,200
is now becoming a major competitive advantage.

803
00:31:04,200 --> 00:31:06,200
Arc also enables a policy as code model

804
00:31:06,200 --> 00:31:08,120
that is truly platform agnostic.

805
00:31:08,120 --> 00:31:10,760
While tools like cloud formation are powerful,

806
00:31:10,760 --> 00:31:13,440
they are generally confined to the AWS ecosystem

807
00:31:13,440 --> 00:31:16,600
and do not help you manage your data center or other clouds.

808
00:31:16,600 --> 00:31:18,120
Arc policy applies everywhere

809
00:31:18,120 --> 00:31:20,880
because it is focused on the intent of the configuration

810
00:31:20,880 --> 00:31:23,600
rather than the specifics of the underlying provider.

811
00:31:23,600 --> 00:31:25,040
Enterprises aren't adopting Arc

812
00:31:25,040 --> 00:31:26,680
because Azure's compute is better

813
00:31:26,680 --> 00:31:28,280
but because Microsoft's governance model

814
00:31:28,280 --> 00:31:31,480
is more comprehensive and easier to enforce at scale.

815
00:31:31,480 --> 00:31:33,960
Entra-Curbos and Cloud-only identities.

816
00:31:33,960 --> 00:31:36,480
Entra-Curbos is a cloud-native authentication protocol

817
00:31:36,480 --> 00:31:39,600
that finally kills off a fundamental architectural requirement

818
00:31:39,600 --> 00:31:42,760
that has haunted enterprise environments for decades.

819
00:31:42,760 --> 00:31:45,280
Historically, if you wanted Kerberos authentication,

820
00:31:45,280 --> 00:31:47,360
you needed active directory domain controllers

821
00:31:47,360 --> 00:31:48,360
living on premises.

822
00:31:48,360 --> 00:31:51,160
That was a non-negotiable law of the data center.

823
00:31:51,160 --> 00:31:53,840
Accessing file shares or using Kerberos-based security

824
00:31:53,840 --> 00:31:55,880
meant you had to maintain a domain controller

825
00:31:55,880 --> 00:31:57,800
and show a constant line of side connectivity

826
00:31:57,800 --> 00:31:59,800
and swallow the massive infrastructure overhead

827
00:31:59,800 --> 00:32:00,920
that came with it.

828
00:32:00,920 --> 00:32:03,680
Entra-Curbos changes that equation completely.

829
00:32:03,680 --> 00:32:07,360
This shift makes Entra-ID the KDC, the key distribution center.

830
00:32:07,360 --> 00:32:09,800
Instead of relying on a physical box in a server room

831
00:32:09,800 --> 00:32:13,600
to issue Kerberos tickets, Entra-ID handles the heavy lifting

832
00:32:13,600 --> 00:32:14,440
from the cloud.

833
00:32:14,440 --> 00:32:17,920
An employee using an Entra-joint laptop can now authenticate

834
00:32:17,920 --> 00:32:19,760
to Azure files without ever talking

835
00:32:19,760 --> 00:32:21,840
to an on-premises domain controller.

836
00:32:21,840 --> 00:32:23,920
They can jump into an Azure virtual desktop session

837
00:32:23,920 --> 00:32:25,920
without a VPN tunnel back to the home office

838
00:32:25,920 --> 00:32:27,520
allowing them to work from anywhere

839
00:32:27,520 --> 00:32:29,720
while maintaining full Kerberos security.

840
00:32:29,720 --> 00:32:33,000
This is not just a new feature, it is a massive architectural shift.

841
00:32:33,000 --> 00:32:34,560
To understand the operational impact,

842
00:32:34,560 --> 00:32:36,800
you have to look at the old way of doing things.

843
00:32:36,800 --> 00:32:39,120
Traditionally, migrating file service to Azure

844
00:32:39,120 --> 00:32:41,560
created a specific kind of architectural friction

845
00:32:41,560 --> 00:32:43,920
because while Azure file supports SMB,

846
00:32:43,920 --> 00:32:47,680
and SMB supports Kerberos, Kerberos always required a KDC.

847
00:32:47,680 --> 00:32:50,080
You were trapped in a cycle where you either kept your aging

848
00:32:50,080 --> 00:32:51,800
on premises domain controllers running

849
00:32:51,800 --> 00:32:55,120
or you settled for weaker, less secure authentication methods.

850
00:32:55,120 --> 00:32:57,400
Entra Kerberos removes that trap by turning Entra-ID

851
00:32:57,400 --> 00:32:58,840
into the KDC itself.

852
00:32:58,840 --> 00:33:01,840
Cloud-only identities, users who exist solely in Entra-ID

853
00:33:01,840 --> 00:33:03,720
with no footprint in a local AD,

854
00:33:03,720 --> 00:33:06,920
can now authenticate to Azure files using pure Kerberos.

855
00:33:06,920 --> 00:33:08,560
The entire flow is cloud-native,

856
00:33:08,560 --> 00:33:11,160
which means you no longer need on-premises infrastructure,

857
00:33:11,160 --> 00:33:14,080
VPN tunnels, or fragile line-of-side dependencies

858
00:33:14,080 --> 00:33:15,160
to keep things running.

859
00:33:15,160 --> 00:33:17,680
The implications here are significant for any organization

860
00:33:17,680 --> 00:33:19,320
looking to decouple from Legacy Hardware.

861
00:33:19,320 --> 00:33:21,760
You can now decommission your domain controllers,

862
00:33:21,760 --> 00:33:23,800
shut down your local identity systems

863
00:33:23,800 --> 00:33:27,120
and operate entirely in the cloud with enterprise-grade encryption.

864
00:33:27,120 --> 00:33:30,600
Kerberos is no longer a legacy protocol tied to a server rack.

865
00:33:30,600 --> 00:33:33,040
It has been redefined as a cloud-native tool.

866
00:33:33,040 --> 00:33:34,680
AWS has no real answer to this

867
00:33:34,680 --> 00:33:36,760
because they don't own the enterprise identity layer

868
00:33:36,760 --> 00:33:37,760
in the first place.

869
00:33:37,760 --> 00:33:40,760
Since AWS IM is built to manage resources,

870
00:33:40,760 --> 00:33:42,960
rather than identities, they cannot offer

871
00:33:42,960 --> 00:33:45,080
a cloud-only identity infrastructure

872
00:33:45,080 --> 00:33:47,000
or turn their platform into a KDC.

873
00:33:47,000 --> 00:33:49,960
They simply don't own the foundational layer required

874
00:33:49,960 --> 00:33:52,480
to build this kind of authentication architecture.

875
00:33:52,480 --> 00:33:54,680
Enter Kerberos is the technical manifestation

876
00:33:54,680 --> 00:33:56,000
of control play and gravity.

877
00:33:56,000 --> 00:33:58,760
It strips away the last valid architectural reason

878
00:33:58,760 --> 00:34:01,200
to keep identity infrastructure on-premises

879
00:34:01,200 --> 00:34:03,800
as organizations no longer need local domain controllers

880
00:34:03,800 --> 00:34:05,200
for basic authentication.

881
00:34:05,200 --> 00:34:07,240
Enter ID handles the entire stack

882
00:34:07,240 --> 00:34:10,160
in a way that is scalable, governed, and entirely cloud-native.

883
00:34:10,160 --> 00:34:11,760
This matters because it accelerates

884
00:34:11,760 --> 00:34:14,440
the inevitable move toward cloud-only architectures.

885
00:34:14,440 --> 00:34:15,880
Organizations that used to struggle

886
00:34:15,880 --> 00:34:18,960
with hybrid identity setups and complex synchronization

887
00:34:18,960 --> 00:34:21,440
can now cut the cord and move everything to the cloud.

888
00:34:21,440 --> 00:34:24,480
They eliminate the mess of managing two separate identity systems

889
00:34:24,480 --> 00:34:27,680
and the administrative debt that comes with synchronization errors.

890
00:34:27,680 --> 00:34:30,440
When an organization moves to a cloud-only identity model,

891
00:34:30,440 --> 00:34:32,400
they aren't just using a Microsoft service,

892
00:34:32,400 --> 00:34:35,520
they are embedding themselves deeper into the ecosystem.

893
00:34:35,520 --> 00:34:37,800
Enter ID becomes the sole source of truth

894
00:34:37,800 --> 00:34:40,480
and a non-negotiable part of daily operations.

895
00:34:40,480 --> 00:34:42,240
The control plane becomes more visible

896
00:34:42,240 --> 00:34:44,560
and more essential to the business than ever before.

897
00:34:44,560 --> 00:34:46,320
This is how gravity works in practice.

898
00:34:46,320 --> 00:34:49,000
Enter Kerberos doesn't force you to use Azure through a contract,

899
00:34:49,000 --> 00:34:51,440
but you adopt it because it solves the very real problem

900
00:34:51,440 --> 00:34:53,600
of legacy infrastructure dependencies.

901
00:34:53,600 --> 00:34:56,600
However, that choice makes Enter ID strategically dominant,

902
00:34:56,600 --> 00:34:58,440
increasing the importance of the control plane

903
00:34:58,440 --> 00:35:01,960
and making the cost of switching nearly impossible to justify.

904
00:35:01,960 --> 00:35:03,880
Once your identity stack lives in Enter ID

905
00:35:03,880 --> 00:35:06,280
and your file servers rely on Enter Kerberos,

906
00:35:06,280 --> 00:35:08,720
you cannot easily migrate to a different provider.

907
00:35:08,720 --> 00:35:10,760
Moving to AWS identity infrastructure

908
00:35:10,760 --> 00:35:12,200
becomes a functional nightmare

909
00:35:12,200 --> 00:35:13,960
rather than a simple business decision.

910
00:35:13,960 --> 00:35:15,840
You are locked in, not by a salesperson,

911
00:35:15,840 --> 00:35:18,760
but by the functional necessity of your own architecture.

912
00:35:18,760 --> 00:35:20,720
That is the kind of architectural lock-in

913
00:35:20,720 --> 00:35:22,520
that actually matters in the enterprise.

914
00:35:22,520 --> 00:35:25,440
It isn't about your licensing agreement or assigned commitment.

915
00:35:25,440 --> 00:35:28,440
It's about the fact that Enter ID is now the foundation

916
00:35:28,440 --> 00:35:29,960
of your entire environment.

917
00:35:29,960 --> 00:35:32,840
If you remove that layer, everything else stops working immediately.

918
00:35:32,840 --> 00:35:34,560
AWS will likely never compete here

919
00:35:34,560 --> 00:35:37,720
because they focus on compute, storage, and databases

920
00:35:37,720 --> 00:35:39,080
rather than the identity layer.

921
00:35:39,080 --> 00:35:40,840
Microsoft owns the foundational piece

922
00:35:40,840 --> 00:35:43,360
that makes all those other services function.

923
00:35:43,360 --> 00:35:45,920
Enter Kerberos is just one more mechanism designed

924
00:35:45,920 --> 00:35:50,400
to deepen that control and ensure the center of gravity stays exactly where it is.

925
00:35:50,400 --> 00:35:54,200
The hybrid inevitability, 90% by 2027,

926
00:35:54,200 --> 00:35:56,480
Gardner predicts that 90% of organizations

927
00:35:56,480 --> 00:35:59,080
will adopt a hybrid cloud model by 2027.

928
00:35:59,080 --> 00:36:02,160
We should be very clear about what that number represents.

929
00:36:02,160 --> 00:36:04,880
This isn't a guess that most companies will try hybrid

930
00:36:04,880 --> 00:36:06,560
and fail to reach the real cloud,

931
00:36:06,560 --> 00:36:09,360
nor is it a forecast of a temporary transition phase.

932
00:36:09,360 --> 00:36:11,120
This is a statement that hybrid cloud

933
00:36:11,120 --> 00:36:14,120
is the final architectural end state for the enterprise.

934
00:36:14,120 --> 00:36:16,480
This shift isn't happening because organizations

935
00:36:16,480 --> 00:36:18,960
failed their cloud migrations or couldn't afford the bill.

936
00:36:18,960 --> 00:36:22,160
It is happening because hybrid is the optimal way to run a business.

937
00:36:22,160 --> 00:36:24,360
It is the only architecture that actually aligns

938
00:36:24,360 --> 00:36:27,560
with how large-scale enterprises operate in the real world.

939
00:36:27,560 --> 00:36:30,760
Hybrid setups allow organizations to solve for data residency

940
00:36:30,760 --> 00:36:32,840
in a way that pure cloud cannot match.

941
00:36:32,840 --> 00:36:35,320
Sensitivity or regulated data stays on premises

942
00:36:35,320 --> 00:36:36,920
to satisfy legal requirements,

943
00:36:36,920 --> 00:36:39,000
while elastic workloads and AI training

944
00:36:39,000 --> 00:36:40,520
scale out to cloud GPUs.

945
00:36:40,520 --> 00:36:42,720
This isn't a compromise made out of weakness.

946
00:36:42,720 --> 00:36:45,840
It is a deliberate optimization of resources and compliance.

947
00:36:45,840 --> 00:36:48,280
You also get cost benefits that a pure cloud model

948
00:36:48,280 --> 00:36:49,600
struggles to provide.

949
00:36:49,600 --> 00:36:52,400
Predictible steady state workloads run on premises

950
00:36:52,400 --> 00:36:54,920
where you can own the hardware and amortize the cost

951
00:36:54,920 --> 00:36:55,880
over several years.

952
00:36:55,880 --> 00:36:58,280
Meanwhile, your bursty or experimental workloads

953
00:36:58,280 --> 00:37:00,840
run in the cloud where you only pay for what you use.

954
00:37:00,840 --> 00:37:02,440
This isn't a failure to migrate.

955
00:37:02,440 --> 00:37:04,680
It is a mature strategy that matches infrastructure

956
00:37:04,680 --> 00:37:06,600
to the specific needs of the workload.

957
00:37:06,600 --> 00:37:09,320
Latency is another area where hybrid wins.

958
00:37:09,320 --> 00:37:11,080
Real-time processing and edge inference

959
00:37:11,080 --> 00:37:13,640
happen on-site where every millisecond counts,

960
00:37:13,640 --> 00:37:15,360
while the heavy lifting of model training

961
00:37:15,360 --> 00:37:17,920
happens in the cloud where resources are plentiful.

962
00:37:17,920 --> 00:37:20,520
Keeping data close to the point of use means network latency

963
00:37:20,520 --> 00:37:23,440
stops being a bottleneck for your most critical applications.

964
00:37:23,440 --> 00:37:26,200
Finally, hybrid provides a level of security isolation

965
00:37:26,200 --> 00:37:28,560
that the pure cloud model lacks.

966
00:37:28,560 --> 00:37:31,160
Legacy systems that are too risky to modernize

967
00:37:31,160 --> 00:37:34,520
can stay on premises, completely air-gapped from the cloud,

968
00:37:34,520 --> 00:37:37,440
while your modern apps run with cloud-native security.

969
00:37:37,440 --> 00:37:40,720
You aren't trying to force every single app into one rigid model,

970
00:37:40,720 --> 00:37:43,800
which shows architectural maturity rather than a lack of progress.

971
00:37:43,800 --> 00:37:46,640
The 90% forecast isn't an aspirational goal.

972
00:37:46,640 --> 00:37:49,320
It is a description of where the market is already going.

973
00:37:49,320 --> 00:37:51,360
Hybrid is the most efficient architecture

974
00:37:51,360 --> 00:37:52,800
for practical operations.

975
00:37:52,800 --> 00:37:55,760
And that reality changes the entire competitive landscape.

976
00:37:55,760 --> 00:37:58,040
In a hybrid world, the most important question

977
00:37:58,040 --> 00:38:00,400
is no longer which cloud are we using.

978
00:38:00,400 --> 00:38:02,400
But who is governing the whole thing?

979
00:38:02,400 --> 00:38:05,360
The first era of the cloud wars was about where to build

980
00:38:05,360 --> 00:38:07,040
and that favored AWS.

981
00:38:07,040 --> 00:38:09,600
They had the most services, the most regions,

982
00:38:09,600 --> 00:38:11,960
and the most mature tools for developers.

983
00:38:11,960 --> 00:38:15,120
When organizations asked where they should put their new workloads,

984
00:38:15,120 --> 00:38:17,200
the answer was almost always AWS,

985
00:38:17,200 --> 00:38:20,560
and as a result, AWS won that initial round of the fight.

986
00:38:20,560 --> 00:38:22,960
But the new question is about who governs identity

987
00:38:22,960 --> 00:38:25,080
and policy across multiple environments,

988
00:38:25,080 --> 00:38:26,560
and that favors Microsoft.

989
00:38:26,560 --> 00:38:28,800
Because Microsoft owns the enterprise identity

990
00:38:28,800 --> 00:38:29,880
and the governance layer,

991
00:38:29,880 --> 00:38:32,280
they are the natural answer for any organization

992
00:38:32,280 --> 00:38:34,240
trying to manage a split environment.

993
00:38:34,240 --> 00:38:37,000
They extend their control plane across AWS workloads

994
00:38:37,000 --> 00:38:38,320
and on premises servers alike.

995
00:38:38,320 --> 00:38:40,320
And in that arena, Microsoft wins.

996
00:38:40,320 --> 00:38:42,120
This is a total architectural inversion.

997
00:38:42,120 --> 00:38:43,960
In a pure cloud world, the provider

998
00:38:43,960 --> 00:38:46,600
with the best infrastructure wins, but in a hybrid world,

999
00:38:46,600 --> 00:38:49,080
the provider with the best control plane takes the lead.

1000
00:38:49,080 --> 00:38:50,720
AWS was built for the first world

1001
00:38:50,720 --> 00:38:53,280
while Microsoft has spent decades preparing for the second.

1002
00:38:53,280 --> 00:38:56,000
By 2027, when nearly everyone is hybrid,

1003
00:38:56,000 --> 00:38:59,240
the original debate over which cloud is better will become irrelevant.

1004
00:38:59,240 --> 00:39:02,440
Most companies will already be using AWS as your

1005
00:39:02,440 --> 00:39:04,840
and Google cloud simultaneously.

1006
00:39:04,840 --> 00:39:07,520
The real battle will be over how to govern that complexity

1007
00:39:07,520 --> 00:39:10,360
and that is a conversation that Microsoft completely dominates.

1008
00:39:10,360 --> 00:39:12,640
This is why the hybrid forecast is so important.

1009
00:39:12,640 --> 00:39:14,640
It isn't just a market stat, it's a signal

1010
00:39:14,640 --> 00:39:17,280
of which architectural concerns are going to matter most

1011
00:39:17,280 --> 00:39:18,040
in the coming years.

1012
00:39:18,040 --> 00:39:19,560
It tells us that the control plane,

1013
00:39:19,560 --> 00:39:21,800
the identity, the policy and the governance

1014
00:39:21,800 --> 00:39:23,320
is the only thing that determines

1015
00:39:23,320 --> 00:39:26,400
a competitive advantage in a fragmented environment.

1016
00:39:26,400 --> 00:39:29,520
AWS will likely continue to lead in raw infrastructure

1017
00:39:29,520 --> 00:39:32,480
and run more total workloads than anyone else.

1018
00:39:32,480 --> 00:39:34,560
But Microsoft will be the one defining

1019
00:39:34,560 --> 00:39:36,040
how those workloads are governed

1020
00:39:36,040 --> 00:39:37,640
and who has access to them.

1021
00:39:37,640 --> 00:39:39,880
They will set the rules for policy and compliance

1022
00:39:39,880 --> 00:39:41,480
across the entire industry.

1023
00:39:41,480 --> 00:39:43,480
That is the inevitability of the hybrid model.

1024
00:39:43,480 --> 00:39:45,440
It is the reason why the control plane belongs

1025
00:39:45,440 --> 00:39:48,680
to Microsoft regardless of where the actual servers are located.

1026
00:39:48,680 --> 00:39:51,680
The licensing lock-in, enterprise agreements and bundling.

1027
00:39:51,680 --> 00:39:54,520
Microsoft enterprise agreements bundle services together

1028
00:39:54,520 --> 00:39:56,960
in a way that AWS fundamentally cannot replicate.

1029
00:39:56,960 --> 00:39:59,720
To understand why the control plane story is actually

1030
00:39:59,720 --> 00:40:03,400
a financial one, we have to look at what an EA actually contains.

1031
00:40:03,400 --> 00:40:07,680
An enterprise agreement typically bundles Microsoft 365 e5,

1032
00:40:07,680 --> 00:40:09,680
which covers the core of daily work

1033
00:40:09,680 --> 00:40:12,280
through Teams, Exchange, SharePoint and OneDrive.

1034
00:40:12,280 --> 00:40:15,560
It includes Microsoft Entry DP2 for identity governance

1035
00:40:15,560 --> 00:40:18,640
and privilege identity management alongside Microsoft Defender

1036
00:40:18,640 --> 00:40:22,080
for Cloud to monitor security across Azure, AWS

1037
00:40:22,080 --> 00:40:23,840
and on-premises environments.

1038
00:40:23,840 --> 00:40:25,760
The bundle also provides Microsoft Sentinel

1039
00:40:25,760 --> 00:40:27,200
for centralized security management,

1040
00:40:27,200 --> 00:40:30,120
Microsoft Perview for data classification and risk detection

1041
00:40:30,120 --> 00:40:33,200
and Microsoft co-pilot to integrate AI into every workflow.

1042
00:40:33,200 --> 00:40:34,960
This is not a simple feature list.

1043
00:40:34,960 --> 00:40:36,400
It is an architectural lock-in.

1044
00:40:36,400 --> 00:40:38,040
When an enterprise signs an EA,

1045
00:40:38,040 --> 00:40:40,640
they are doing more than just purchasing software licenses.

1046
00:40:40,640 --> 00:40:43,520
They are committing to Microsoft as their primary control plane.

1047
00:40:43,520 --> 00:40:45,920
By signing that contract, the organization is stating

1048
00:40:45,920 --> 00:40:48,280
that Microsoft will serve as the foundation

1049
00:40:48,280 --> 00:40:52,240
for how they govern identity, enforce policy and operate securely.

1050
00:40:52,240 --> 00:40:54,120
AWS cannot offer an equivalent bundle

1051
00:40:54,120 --> 00:40:56,680
because they do not own the workforce software layer.

1052
00:40:56,680 --> 00:41:01,560
While AWS can provide compute, storage, databases and AI infrastructure,

1053
00:41:01,560 --> 00:41:03,480
they cannot offer identity governance

1054
00:41:03,480 --> 00:41:06,000
that is natively integrated with your daily workflow.

1055
00:41:06,000 --> 00:41:07,720
They cannot provide compliance tools

1056
00:41:07,720 --> 00:41:09,840
that live inside your productivity applications

1057
00:41:09,840 --> 00:41:11,880
and they certainly cannot offer an AI assistant

1058
00:41:11,880 --> 00:41:13,080
that is baked into Teams.

1059
00:41:13,080 --> 00:41:15,640
Because of this, enterprises seeking unified governance

1060
00:41:15,640 --> 00:41:16,640
choose Microsoft.

1061
00:41:16,640 --> 00:41:17,720
Once that choice is made,

1062
00:41:17,720 --> 00:41:19,480
they naturally extend Microsoft's reach

1063
00:41:19,480 --> 00:41:21,760
across their existing AWS workloads.

1064
00:41:21,760 --> 00:41:24,880
They use EntraID to authenticate their AWS users

1065
00:41:24,880 --> 00:41:28,000
and Defender for Cloud to monitor their AWS infrastructure.

1066
00:41:28,000 --> 00:41:30,520
They rely on Sentinel to log access and Perview

1067
00:41:30,520 --> 00:41:33,440
to classify data living in AWS buckets.

1068
00:41:33,440 --> 00:41:36,440
The result is that Microsoft's governance is layer directly

1069
00:41:36,440 --> 00:41:38,400
on top of AWS infrastructure.

1070
00:41:38,400 --> 00:41:40,480
This is the inherent advantage of bundling.

1071
00:41:40,480 --> 00:41:43,240
It is not necessarily that Microsoft's individual products

1072
00:41:43,240 --> 00:41:46,640
outperform AWS alternatives on a feature-by-feature basis.

1073
00:41:46,640 --> 00:41:48,920
The reality is that Microsoft's products are integrated,

1074
00:41:48,920 --> 00:41:51,320
meaning they share data and enforce consistent policy

1075
00:41:51,320 --> 00:41:54,720
without requiring you to glue five different third-party tools together.

1076
00:41:54,720 --> 00:41:56,120
The glue is built into the license.

1077
00:41:56,120 --> 00:41:59,040
An organization signs an EA and receives Microsoft 365,

1078
00:41:59,040 --> 00:42:00,720
which ensures that work happens in Teams

1079
00:42:00,720 --> 00:42:02,520
and identity originates in EntraID.

1080
00:42:02,520 --> 00:42:04,680
Security monitoring flows through Defender,

1081
00:42:04,680 --> 00:42:06,200
audit trails live in Sentinel,

1082
00:42:06,200 --> 00:42:08,360
and compliance is enforced through Perview.

1083
00:42:08,360 --> 00:42:11,240
When those same organizations run AWS workloads,

1084
00:42:11,240 --> 00:42:12,560
they need a way to govern them.

1085
00:42:12,560 --> 00:42:14,040
Microsoft owns the control plane,

1086
00:42:14,040 --> 00:42:16,600
so Microsoft governs the AWS workloads.

1087
00:42:16,600 --> 00:42:18,160
The licensing advantage is profound

1088
00:42:18,160 --> 00:42:19,840
because it scales with the organization.

1089
00:42:19,840 --> 00:42:22,760
An enterprise with 5,000 employees needs M365

1090
00:42:22,760 --> 00:42:24,440
and EntraID for every single person

1091
00:42:24,440 --> 00:42:25,760
and they need Defender and Perview

1092
00:42:25,760 --> 00:42:27,720
to maintain their operational foundation.

1093
00:42:27,720 --> 00:42:29,760
These licenses become non-negotiable

1094
00:42:29,760 --> 00:42:32,720
because they are the bedrock of how the company functions.

1095
00:42:32,720 --> 00:42:35,400
AWS cannot compete here because they do not own

1096
00:42:35,400 --> 00:42:37,000
the foundational layer of the business.

1097
00:42:37,000 --> 00:42:40,120
They might offer better compute or more performant databases,

1098
00:42:40,120 --> 00:42:42,280
but they cannot offer better identity governance

1099
00:42:42,280 --> 00:42:44,160
when they don't own the identity itself.

1100
00:42:44,160 --> 00:42:46,280
They cannot bundle governance with productivity

1101
00:42:46,280 --> 00:42:48,680
because they do not own the productivity suite.

1102
00:42:48,680 --> 00:42:51,440
This is why enterprises extend Microsoft across AWS.

1103
00:42:51,440 --> 00:42:53,840
It isn't because Azure services are more feature-rich,

1104
00:42:53,840 --> 00:42:55,560
but because Microsoft owns the bundle

1105
00:42:55,560 --> 00:42:57,200
and the integration that comes with it.

1106
00:42:57,200 --> 00:42:59,240
Once an organization commits to this bundle,

1107
00:42:59,240 --> 00:43:01,240
the cost of switching becomes astronomical.

1108
00:43:01,240 --> 00:43:03,000
You cannot easily remove EntraID

1109
00:43:03,000 --> 00:43:06,000
without dismantling your entire identity management strategy.

1110
00:43:06,000 --> 00:43:08,280
You cannot pull out Defender or Sentinel

1111
00:43:08,280 --> 00:43:11,720
without losing your security monitoring and audit trails.

1112
00:43:11,720 --> 00:43:13,400
The EA is an architectural commitment

1113
00:43:13,400 --> 00:43:15,360
rather than a simple licensing deal.

1114
00:43:15,360 --> 00:43:18,640
It is a declaration that Microsoft's control plane

1115
00:43:18,640 --> 00:43:20,320
is the foundation of the organization.

1116
00:43:20,320 --> 00:43:21,840
Once that foundation is set,

1117
00:43:21,840 --> 00:43:23,840
the underlying AWS infrastructure

1118
00:43:23,840 --> 00:43:26,320
becomes less strategically important.

1119
00:43:26,320 --> 00:43:28,960
AWS becomes the place where workloads run,

1120
00:43:28,960 --> 00:43:31,760
but Microsoft remains the place where governance happens.

1121
00:43:31,760 --> 00:43:33,920
That is the reality of the licensing lock-in.

1122
00:43:33,920 --> 00:43:35,760
Enterprises standardize on Microsoft

1123
00:43:35,760 --> 00:43:38,720
because the control plane makes everything else work.

1124
00:43:38,720 --> 00:43:42,200
Regulated industries where control plane dominance is absolute

1125
00:43:42,200 --> 00:43:44,200
in healthcare, finance and government

1126
00:43:44,200 --> 00:43:46,160
compliance is an existential requirement

1127
00:43:46,160 --> 00:43:48,680
rather than an optional configuration.

1128
00:43:48,680 --> 00:43:51,160
Regulators are not interested in your infrastructure.

1129
00:43:51,160 --> 00:43:53,400
They care if you can prove that data is protected

1130
00:43:53,400 --> 00:43:55,080
and access is strictly controlled.

1131
00:43:55,080 --> 00:43:56,680
This is where the control plane shifts

1132
00:43:56,680 --> 00:43:59,480
from being a benefit to being a mandatory requirement.

1133
00:43:59,480 --> 00:44:02,760
These industries require specific hard guarantees.

1134
00:44:02,760 --> 00:44:04,040
They need residency protections,

1135
00:44:04,040 --> 00:44:06,600
tamper-proof audit trails and insider risk detection

1136
00:44:06,600 --> 00:44:08,560
that catches threats before a breach occurs.

1137
00:44:08,560 --> 00:44:11,080
They need DLP enforcement to stop sensitive data

1138
00:44:11,080 --> 00:44:14,040
from leaving the perimeter and role-based access control

1139
00:44:14,040 --> 00:44:16,480
that is enforced at every single layer.

1140
00:44:16,480 --> 00:44:18,800
Microsoft PerView provides this entire framework

1141
00:44:18,800 --> 00:44:23,120
across M365, Azure and even federated AWS environments.

1142
00:44:23,120 --> 00:44:25,120
When a healthcare provider needs to prove

1143
00:44:25,120 --> 00:44:26,880
hyper compliance, they do not start

1144
00:44:26,880 --> 00:44:28,840
by auditing their EC2 instances.

1145
00:44:28,840 --> 00:44:30,360
They audit their data flows and check

1146
00:44:30,360 --> 00:44:31,920
who accessed patient records.

1147
00:44:31,920 --> 00:44:33,680
They look at whether DLP policies stopped

1148
00:44:33,680 --> 00:44:34,960
unauthorized sharing.

1149
00:44:34,960 --> 00:44:37,880
PerView answers those questions and provides the audit trail

1150
00:44:37,880 --> 00:44:39,960
that proves compliance to the regulator.

1151
00:44:39,960 --> 00:44:43,160
AWS offers AWS config for infrastructure compliance,

1152
00:44:43,160 --> 00:44:45,760
which is useful for verifying that EC2 instances

1153
00:44:45,760 --> 00:44:49,120
are configured correctly or that S3 buckets are encrypted.

1154
00:44:49,120 --> 00:44:51,320
However, AWS config does not govern data

1155
00:44:51,320 --> 00:44:52,960
or manage retention policies.

1156
00:44:52,960 --> 00:44:54,840
It is a tool for hardening the compute layer,

1157
00:44:54,840 --> 00:44:57,360
but it is not a complete compliance solution.

1158
00:44:57,360 --> 00:44:58,800
There is a critical distinction here

1159
00:44:58,800 --> 00:45:01,360
that regulated industries understand perfectly.

1160
00:45:01,360 --> 00:45:04,200
AWS is compliant with HIPAA, meaning their data centers

1161
00:45:04,200 --> 00:45:06,280
are secure and their encryption is strong,

1162
00:45:06,280 --> 00:45:08,560
but Microsoft's governance layer is what actually

1163
00:45:08,560 --> 00:45:10,560
enforces HIPAA for the organization.

1164
00:45:10,560 --> 00:45:12,760
When a healthcare company runs a regulated workload

1165
00:45:12,760 --> 00:45:15,760
on AWS, they still rely on PerView for data governance.

1166
00:45:15,760 --> 00:45:18,280
They still need Sentinel to audit record access

1167
00:45:18,280 --> 00:45:21,600
and enter ID to manage identity through context-aware policies.

1168
00:45:21,600 --> 00:45:24,120
They require the entire Microsoft governance stack

1169
00:45:24,120 --> 00:45:26,840
even when the infrastructure belongs to AWS.

1170
00:45:26,840 --> 00:45:28,360
This creates a strange inversion.

1171
00:45:28,360 --> 00:45:30,800
AWS provides the compliant infrastructure,

1172
00:45:30,800 --> 00:45:33,360
but Microsoft provides the compliant governance.

1173
00:45:33,360 --> 00:45:35,440
In these industries, the governance is what matters

1174
00:45:35,440 --> 00:45:38,240
because the infrastructure has become a commodity.

1175
00:45:38,240 --> 00:45:41,240
Every major cloud provider meets the basic regulatory requirements

1176
00:45:41,240 --> 00:45:42,920
for storage and compute.

1177
00:45:42,920 --> 00:45:45,240
The real differentiator is the governance layer

1178
00:45:45,240 --> 00:45:48,120
that makes those requirements provable to an auditor.

1179
00:45:48,120 --> 00:45:49,600
When the regulator arrives,

1180
00:45:49,600 --> 00:45:52,360
the organization doesn't show them a list of AWS servers.

1181
00:45:52,360 --> 00:45:54,360
They show them the PerView compliance dashboard

1182
00:45:54,360 --> 00:45:56,080
and the Sentinel audit logs.

1183
00:45:56,080 --> 00:45:58,760
Financial services experience these same pressures.

1184
00:45:58,760 --> 00:46:01,440
To prove ASOX compliance, a bank must demonstrate

1185
00:46:01,440 --> 00:46:03,920
that access to critical systems is controlled

1186
00:46:03,920 --> 00:46:06,600
and that insider threats are being monitored.

1187
00:46:06,600 --> 00:46:08,320
PerView handles this natively,

1188
00:46:08,320 --> 00:46:11,120
while AWS config simply cannot reach that level

1189
00:46:11,120 --> 00:46:12,680
of data-centric oversight.

1190
00:46:12,680 --> 00:46:15,600
Government agencies face the most intense requirements of all,

1191
00:46:15,600 --> 00:46:18,880
including FedRAMP, NIST and CMMC frameworks.

1192
00:46:18,880 --> 00:46:21,360
These standards demand centralized identity management

1193
00:46:21,360 --> 00:46:23,400
and comprehensive continuous monitoring.

1194
00:46:23,400 --> 00:46:25,680
Microsoft's governance layer was built to address

1195
00:46:25,680 --> 00:46:27,040
these specific needs.

1196
00:46:27,040 --> 00:46:30,360
While AWS infrastructure can be FedRAMP compliant,

1197
00:46:30,360 --> 00:46:33,320
AWS does not own the governance layer that actually proves it.

1198
00:46:33,320 --> 00:46:35,920
This is where control plane dominance becomes absolute.

1199
00:46:35,920 --> 00:46:39,000
In these sectors, the control plane is the entire business.

1200
00:46:39,000 --> 00:46:41,760
Organizations do not choose between AWS and Azure

1201
00:46:41,760 --> 00:46:44,240
based on how fast a virtual machine boots up.

1202
00:46:44,240 --> 00:46:46,680
They choose based on which platform allows them to survive

1203
00:46:46,680 --> 00:46:47,240
and audit.

1204
00:46:47,240 --> 00:46:49,240
Microsoft owns this space entirely.

1205
00:46:49,240 --> 00:46:51,560
AWS will continue to provide the hardware

1206
00:46:51,560 --> 00:46:53,280
and the compliant data centers,

1207
00:46:53,280 --> 00:46:55,880
but Microsoft will continue to own the governance layer

1208
00:46:55,880 --> 00:46:57,440
in the world of regulated industries.

1209
00:46:57,440 --> 00:46:59,680
That is the only thing that determines the winner.

1210
00:46:59,680 --> 00:47:02,680
That is where the battle for the enterprise is being won.

1211
00:47:02,680 --> 00:47:04,120
Government and sovereign cloud

1212
00:47:04,120 --> 00:47:06,120
where Microsoft's advantage is structural.

1213
00:47:06,120 --> 00:47:08,240
Most organizations view sovereign clouds

1214
00:47:08,240 --> 00:47:11,520
as a simple matter of data residency, but they are wrong.

1215
00:47:11,520 --> 00:47:14,040
Microsoft operates specialized regions in territories

1216
00:47:14,040 --> 00:47:16,680
where data sovereignty is a non-negotiable requirement

1217
00:47:16,680 --> 00:47:17,520
of doing business.

1218
00:47:17,520 --> 00:47:19,560
You see this in Germany through Deutsche Telekom

1219
00:47:19,560 --> 00:47:22,680
in China via 21 VNET and across the US government

1220
00:47:22,680 --> 00:47:25,720
with GCC, GCC high and DOD variants.

1221
00:47:25,720 --> 00:47:27,520
These are not merely infrastructure regions

1222
00:47:27,520 --> 00:47:29,080
designed to host virtual machines.

1223
00:47:29,080 --> 00:47:30,240
They are governance containers

1224
00:47:30,240 --> 00:47:33,240
where the system enforces boundaries by design.

1225
00:47:33,240 --> 00:47:36,880
Within these walls, identity remains local, data stays put,

1226
00:47:36,880 --> 00:47:38,800
and regulators can perform audits

1227
00:47:38,800 --> 00:47:42,400
because nothing leaves the perimeter without explicit authorization.

1228
00:47:42,400 --> 00:47:44,180
AWS maintains similar footprints with

1229
00:47:44,180 --> 00:47:46,420
Gough Cloud and various international regions

1230
00:47:46,420 --> 00:47:48,860
yet a fundamental architectural gap remains.

1231
00:47:48,860 --> 00:47:51,620
While AWS can host the underlying infrastructure

1232
00:47:51,620 --> 00:47:53,180
in these sensitive locations,

1233
00:47:53,180 --> 00:47:54,900
they do not own the governance layer

1234
00:47:54,900 --> 00:47:56,740
that sits on top of that hardware.

1235
00:47:56,740 --> 00:47:59,580
The US government still runs its workforce collaboration

1236
00:47:59,580 --> 00:48:02,700
on Microsoft 365, meaning that even in the most restricted

1237
00:48:02,700 --> 00:48:06,300
GCC high environments, the control plane belongs to Microsoft.

1238
00:48:06,300 --> 00:48:08,820
Decisions are made in teams, documents live in SharePoint

1239
00:48:08,820 --> 00:48:10,940
and communications are archived in exchange

1240
00:48:10,940 --> 00:48:13,820
while EntraID serves as the origin for every identity.

1241
00:48:13,820 --> 00:48:15,620
Security is monitored through defender

1242
00:48:15,620 --> 00:48:18,340
and audit trails are consolidated in Sentinel,

1243
00:48:18,340 --> 00:48:20,420
creating a reality where Microsoft manages

1244
00:48:20,420 --> 00:48:22,260
the entire operational context.

1245
00:48:22,260 --> 00:48:26,060
This distinction matters because it is a structural reality

1246
00:48:26,060 --> 00:48:29,780
rather than a simple feature comparison or product evaluation.

1247
00:48:29,780 --> 00:48:32,180
We are looking at a scenario where Microsoft owns

1248
00:48:32,180 --> 00:48:34,100
the entire stack in sovereign environments

1249
00:48:34,100 --> 00:48:37,020
while AWS is relegated to providing the substrate.

1250
00:48:37,020 --> 00:48:39,460
AWS provides the raw infrastructure

1251
00:48:39,460 --> 00:48:41,100
but Microsoft provides the governance

1252
00:48:41,100 --> 00:48:43,860
that makes that infrastructure usable for regulated agency.

1253
00:48:43,860 --> 00:48:45,420
Consider the operational consequences

1254
00:48:45,420 --> 00:48:47,740
for a government agency running a multi-cloud strategy

1255
00:48:47,740 --> 00:48:48,700
within GCC high.

1256
00:48:48,700 --> 00:48:50,700
They might have workload sitting in AWS

1257
00:48:50,700 --> 00:48:54,060
and Azure simultaneously alongside legacy on premises systems

1258
00:48:54,060 --> 00:48:56,700
yet they still require a unified way to manage them all.

1259
00:48:56,700 --> 00:48:58,100
Microsoft provides that bridge

1260
00:48:58,100 --> 00:49:00,660
because EntraID authenticates the users

1261
00:49:00,660 --> 00:49:03,220
and conditional access enforces the policies

1262
00:49:03,220 --> 00:49:04,860
across the entire environment.

1263
00:49:04,860 --> 00:49:06,820
Defender monitors the AWS instances

1264
00:49:06,820 --> 00:49:09,820
while Sentinel logs the access and purview ensures compliance

1265
00:49:09,820 --> 00:49:13,020
meaning the entire governance layer is a Microsoft engine

1266
00:49:13,020 --> 00:49:15,100
operating within the sovereign boundary.

1267
00:49:15,100 --> 00:49:16,980
AWS cannot replicate this model

1268
00:49:16,980 --> 00:49:19,420
because they do not own the identity system

1269
00:49:19,420 --> 00:49:22,140
or the policy engine required to authenticate users

1270
00:49:22,140 --> 00:49:24,460
and enforce context-aware access.

1271
00:49:24,460 --> 00:49:26,820
They can provide compliant racks and power

1272
00:49:26,820 --> 00:49:29,140
but they cannot provide the overarching framework

1273
00:49:29,140 --> 00:49:31,100
that proves to a regulator that every policy

1274
00:49:31,100 --> 00:49:32,500
is being strictly enforced.

1275
00:49:32,500 --> 00:49:34,340
This structural advantage repeats itself

1276
00:49:34,340 --> 00:49:36,340
in every sovereign region across the globe.

1277
00:49:36,340 --> 00:49:38,540
In Germany the data and identity stay local

1278
00:49:38,540 --> 00:49:40,580
but the system that determines who has access

1279
00:49:40,580 --> 00:49:42,820
and what they can do still belongs to Microsoft.

1280
00:49:42,820 --> 00:49:45,300
For government agencies this is the decisive factor

1281
00:49:45,300 --> 00:49:48,180
that outweighs compute performance or storage capacity

1282
00:49:48,180 --> 00:49:50,100
every single time they aren't buying features

1283
00:49:50,100 --> 00:49:51,780
they are buying the ability to operate

1284
00:49:51,780 --> 00:49:55,100
within a sovereign boundary using a single unified governance model.

1285
00:49:55,100 --> 00:49:57,420
This is why government adoption consistently favors

1286
00:49:57,420 --> 00:49:59,860
Microsoft regardless of whether Azure infrastructure

1287
00:49:59,860 --> 00:50:01,220
is better in a vacuum.

1288
00:50:01,220 --> 00:50:04,020
Microsoft owns the identity, the policy, the compliance

1289
00:50:04,020 --> 00:50:05,780
and the audit trail all contained

1290
00:50:05,780 --> 00:50:07,900
within the required sovereignty boundary.

1291
00:50:07,900 --> 00:50:10,740
AWS will continue to provide the underlying infrastructure

1292
00:50:10,740 --> 00:50:12,220
but they will never control the layer

1293
00:50:12,220 --> 00:50:13,780
where the government actually operates

1294
00:50:13,780 --> 00:50:16,020
and where compliance is ultimately proven.

1295
00:50:16,020 --> 00:50:18,980
As agencies adopt teams, sharepoint and outlook

1296
00:50:18,980 --> 00:50:20,580
this structural advantage compounds

1297
00:50:20,580 --> 00:50:22,780
and the control plane becomes even more critical

1298
00:50:22,780 --> 00:50:24,100
to daily operations.

1299
00:50:24,100 --> 00:50:27,340
The implementation of co-pilot only deepens this dependence

1300
00:50:27,340 --> 00:50:30,180
and as agencies move toward cloud only identities

1301
00:50:30,180 --> 00:50:33,180
via intra-carberos they eliminate their old on premises

1302
00:50:33,180 --> 00:50:34,420
footprint entirely.

1303
00:50:34,420 --> 00:50:36,420
The real advantage isn't found in current products

1304
00:50:36,420 --> 00:50:39,020
but in the architectural foundation of the companies themselves.

1305
00:50:39,020 --> 00:50:41,300
Microsoft built the control plane first

1306
00:50:41,300 --> 00:50:42,900
and attached infrastructure to it

1307
00:50:42,900 --> 00:50:44,620
whereas AWS built infrastructure

1308
00:50:44,620 --> 00:50:47,820
and tried to bolt on governance as an afterthought.

1309
00:50:47,820 --> 00:50:50,740
In sovereign environments where governance is the entire business

1310
00:50:50,740 --> 00:50:53,740
that original architectural intent determines the winner.

1311
00:50:53,740 --> 00:50:56,540
By 2027 the shift to cloud only identities

1312
00:50:56,540 --> 00:50:58,820
and the rollout of AI across the workforce

1313
00:50:58,820 --> 00:51:00,980
will make this advantage feel insurmountable.

1314
00:51:00,980 --> 00:51:03,580
AWS will still be a viable compliant platform

1315
00:51:03,580 --> 00:51:04,940
for hosting workloads

1316
00:51:04,940 --> 00:51:07,060
but Microsoft will control the decision engine

1317
00:51:07,060 --> 00:51:09,380
that dictates every action within the environment.

1318
00:51:09,380 --> 00:51:12,220
In the world of regulated industries and government contracts

1319
00:51:12,220 --> 00:51:14,420
that structural ownership of the control plane

1320
00:51:14,420 --> 00:51:16,540
is the only thing that actually matters.

1321
00:51:16,540 --> 00:51:20,580
The CIO's dilemma, unified control versus best of breed services.

1322
00:51:20,580 --> 00:51:22,460
CIOs are currently facing a choice

1323
00:51:22,460 --> 00:51:24,300
that sounds perfectly rational in a boardroom

1324
00:51:24,300 --> 00:51:27,460
but reveals a massive hidden cost once it hits production.

1325
00:51:27,460 --> 00:51:30,060
They have to choose between a unified control plane

1326
00:51:30,060 --> 00:51:32,060
and the best of breed service model

1327
00:51:32,060 --> 00:51:34,740
and this is where architectural theory turns into

1328
00:51:34,740 --> 00:51:36,260
a painful budget decision.

1329
00:51:36,260 --> 00:51:39,020
A unified control plane means committing to a single vendor

1330
00:51:39,020 --> 00:51:42,140
like Microsoft to handle identity policy compliance

1331
00:51:42,140 --> 00:51:45,100
and security monitoring through a single integrated stack.

1332
00:51:45,100 --> 00:51:48,180
You use EntraID for identity, conditional access

1333
00:51:48,180 --> 00:51:50,620
for your policy engine, purview for compliance

1334
00:51:50,620 --> 00:51:52,100
and Sentinel as your CM.

1335
00:51:52,100 --> 00:51:53,980
While the cost per service might be higher

1336
00:51:53,980 --> 00:51:55,700
because you are paying for deep integration

1337
00:51:55,700 --> 00:51:57,540
the trade-off is a simplified operation

1338
00:51:57,540 --> 00:52:00,340
with one dashboard and one consistent governance model.

1339
00:52:00,340 --> 00:52:02,460
The alternative is the best of breed approach

1340
00:52:02,460 --> 00:52:05,420
where you pick the absolute best tool for every specific job

1341
00:52:05,420 --> 00:52:06,260
in the enterprise.

1342
00:52:06,260 --> 00:52:08,940
You might choose Octa for identity, Splunk for your CM

1343
00:52:08,940 --> 00:52:10,540
and a specialized vendor for DLP

1344
00:52:10,540 --> 00:52:12,420
because you want the most advanced solution

1345
00:52:12,420 --> 00:52:13,980
for every individual function.

1346
00:52:13,980 --> 00:52:16,300
On paper this looks cheaper because you only buy exactly

1347
00:52:16,300 --> 00:52:18,540
what you need but the operational complexity

1348
00:52:18,540 --> 00:52:21,460
begins to multiply the moment the contracts are signed.

1349
00:52:21,460 --> 00:52:23,500
Best of breed sounds superior in theory

1350
00:52:23,500 --> 00:52:25,580
because nobody wants to accept an inferior tool

1351
00:52:25,580 --> 00:52:27,260
just for the sake of integration.

1352
00:52:27,260 --> 00:52:30,580
However, this model almost always fails at enterprise scale

1353
00:52:30,580 --> 00:52:32,980
because it ignores the reality of system entropy.

1354
00:52:32,980 --> 00:52:34,580
When you manage 10 different vendors

1355
00:52:34,580 --> 00:52:37,540
you are actually managing 10 different identity systems

1356
00:52:37,540 --> 00:52:39,180
with 10 different credential stores

1357
00:52:39,180 --> 00:52:40,660
and 10 different password policies.

1358
00:52:40,660 --> 00:52:42,820
If an employee changes their password in one system

1359
00:52:42,820 --> 00:52:44,500
and it fails to propagate to the others

1360
00:52:44,500 --> 00:52:46,660
they are immediately locked out of half their tools.

1361
00:52:46,660 --> 00:52:49,620
Support tickets start to pile up and productivity drops

1362
00:52:49,620 --> 00:52:51,660
because the systems aren't talking to each other

1363
00:52:51,660 --> 00:52:52,620
in a meaningful way.

1364
00:52:52,620 --> 00:52:54,420
Compliance becomes a theater performance

1365
00:52:54,420 --> 00:52:56,980
when you have to pull logs from 10 different vendors

1366
00:52:56,980 --> 00:52:58,580
who all use different data formats.

1367
00:52:58,580 --> 00:53:01,220
One might use Jason while another uses CISLOG

1368
00:53:01,220 --> 00:53:03,340
forcing your team to spend weeks normalizing

1369
00:53:03,340 --> 00:53:06,180
and correlating data just to prove a single access event

1370
00:53:06,180 --> 00:53:07,140
to a regulator.

1371
00:53:07,140 --> 00:53:08,860
This isn't true compliance.

1372
00:53:08,860 --> 00:53:11,260
It's a desperate attempt to reconstruct a narrative

1373
00:53:11,260 --> 00:53:13,260
from fragmented pieces of evidence.

1374
00:53:13,260 --> 00:53:15,100
Security posture also suffers

1375
00:53:15,100 --> 00:53:17,420
because you end up with 10 different policy frameworks

1376
00:53:17,420 --> 00:53:19,140
that don't share the same standards.

1377
00:53:19,140 --> 00:53:21,660
One vendor might enforce MFA while another allows

1378
00:53:21,660 --> 00:53:24,140
weak passwords creating a fragmented environment

1379
00:53:24,140 --> 00:53:25,900
where an attacker only needs to find

1380
00:53:25,900 --> 00:53:27,540
the single weakest link to succeed.

1381
00:53:27,540 --> 00:53:30,180
Your security is no longer a cohesive shield.

1382
00:53:30,180 --> 00:53:31,940
It is a collection of mismatched plates

1383
00:53:31,940 --> 00:53:33,220
with gaps in between them.

1384
00:53:33,220 --> 00:53:35,700
The maintenance burden is the final nail in the coffin

1385
00:53:35,700 --> 00:53:38,220
as every integration between these disparate tools

1386
00:53:38,220 --> 00:53:39,940
becomes a potential failure point.

1387
00:53:39,940 --> 00:53:42,940
You have to write custom code to make the identity system

1388
00:53:42,940 --> 00:53:45,660
talk to the seam and the seam talk to the ticketing system

1389
00:53:45,660 --> 00:53:46,980
and all of it breaks the moment

1390
00:53:46,980 --> 00:53:48,460
a vendor updates an API.

1391
00:53:48,460 --> 00:53:50,300
You also stop hiring cloud architects

1392
00:53:50,300 --> 00:53:51,540
and start hiring specialists

1393
00:53:51,540 --> 00:53:54,420
who only know how to run specific point solutions.

1394
00:53:54,420 --> 00:53:56,500
Training and hiring costs skyrocket

1395
00:53:56,500 --> 00:53:58,940
because your team is focused on mastering tools

1396
00:53:58,940 --> 00:54:01,380
that might be obsolete or acquired within a few years.

1397
00:54:01,380 --> 00:54:04,460
This is the true hidden cost of the best of breed strategy.

1398
00:54:04,460 --> 00:54:06,180
It isn't the price of the software

1399
00:54:06,180 --> 00:54:09,140
but the massive overhead of managing the fragmentation.

1400
00:54:09,140 --> 00:54:11,860
A unified control plane eliminates these friction points

1401
00:54:11,860 --> 00:54:14,060
by providing one authentication mechanism,

1402
00:54:14,060 --> 00:54:16,700
one policy engine and one provable audit trail.

1403
00:54:16,700 --> 00:54:18,340
You pay more for the individual services

1404
00:54:18,340 --> 00:54:20,260
but you pay significantly less overall

1405
00:54:20,260 --> 00:54:23,180
because you aren't funding 10 different integration projects

1406
00:54:23,180 --> 00:54:25,220
or 10 different specialist teams.

1407
00:54:25,220 --> 00:54:27,260
This is the core of the CIO's dilemma

1408
00:54:27,260 --> 00:54:30,060
where the best of breed approach wins the technical debate

1409
00:54:30,060 --> 00:54:32,900
but the unified control plane wins the business reality.

1410
00:54:32,900 --> 00:54:34,500
Enterprises choose Microsoft

1411
00:54:34,500 --> 00:54:37,340
not because every individual tool is the market leader

1412
00:54:37,340 --> 00:54:39,700
but because the platform offers a single place

1413
00:54:39,700 --> 00:54:41,900
where policy is actually enforced.

1414
00:54:41,900 --> 00:54:44,140
AWS cannot offer this level of cohesion

1415
00:54:44,140 --> 00:54:45,940
because they do not own the identity

1416
00:54:45,940 --> 00:54:48,300
or the workflow layers of the stack.

1417
00:54:48,300 --> 00:54:51,580
Once an enterprise chooses Microsoft for that unified control

1418
00:54:51,580 --> 00:54:53,380
they inevitably extend that governance

1419
00:54:53,380 --> 00:54:55,460
across their AWS workloads

1420
00:54:55,460 --> 00:54:57,780
and the battle for the control plane is over.

1421
00:54:57,780 --> 00:55:01,460
The architectural inversion, infrastructure,

1422
00:55:01,460 --> 00:55:03,140
subordinate to governance.

1423
00:55:03,140 --> 00:55:05,100
For decades the hierarchy of enterprise IT

1424
00:55:05,100 --> 00:55:07,140
was built entirely around infrastructure.

1425
00:55:07,140 --> 00:55:10,060
You had a data center team to manage physical servers,

1426
00:55:10,060 --> 00:55:12,380
a network team to handle connectivity

1427
00:55:12,380 --> 00:55:14,620
and a storage team to oversee capacity.

1428
00:55:14,620 --> 00:55:16,980
These groups operated in rigid silos

1429
00:55:16,980 --> 00:55:18,260
reporting up different chains

1430
00:55:18,260 --> 00:55:20,740
and optimizing for completely different metrics.

1431
00:55:20,740 --> 00:55:24,180
In that world, infrastructure was the primary organizing principle

1432
00:55:24,180 --> 00:55:26,580
and every other concern was secondary.

1433
00:55:26,580 --> 00:55:29,660
Cloud computing flattened that hierarchy almost overnight.

1434
00:55:29,660 --> 00:55:31,820
Suddenly infrastructure became a commodity

1435
00:55:31,820 --> 00:55:33,020
you could buy off a shelf.

1436
00:55:33,020 --> 00:55:35,300
You no longer needed a dedicated data center team

1437
00:55:35,300 --> 00:55:36,620
because someone else owned the building

1438
00:55:36,620 --> 00:55:38,580
and you didn't need to manage physical hardware

1439
00:55:38,580 --> 00:55:41,780
because providers handled the maintenance for you.

1440
00:55:41,780 --> 00:55:44,940
Compute, storage and networking all transformed into services

1441
00:55:44,940 --> 00:55:47,620
which meant infrastructure was no longer a scarce resource

1442
00:55:47,620 --> 00:55:49,220
or a meaningful constraint.

1443
00:55:49,220 --> 00:55:50,980
When infrastructure stops being scarce,

1444
00:55:50,980 --> 00:55:52,620
the bottleneck shifts elsewhere.

1445
00:55:52,620 --> 00:55:54,180
The new scarcity is governance.

1446
00:55:54,180 --> 00:55:55,460
The new constraint is policy.

1447
00:55:55,460 --> 00:55:57,140
The real struggle now is the ability

1448
00:55:57,140 --> 00:55:59,420
to enforce consistent rules across a messy

1449
00:55:59,420 --> 00:56:01,100
fragmented collection of platforms

1450
00:56:01,100 --> 00:56:02,900
and this is the architectural inversion.

1451
00:56:02,900 --> 00:56:06,300
While organizations used to be built around their hardware,

1452
00:56:06,300 --> 00:56:08,980
they are now being rebuilt around their governance models.

1453
00:56:08,980 --> 00:56:10,660
Infrastructure has become subordinate

1454
00:56:10,660 --> 00:56:13,140
while governance has become the primary driver of design.

1455
00:56:13,140 --> 00:56:15,540
Think about how this changes your day-to-day operations.

1456
00:56:15,540 --> 00:56:16,700
In the old model you picked

1457
00:56:16,700 --> 00:56:18,580
an infrastructure provider first

1458
00:56:18,580 --> 00:56:20,780
deciding to build on AWS or Azure

1459
00:56:20,780 --> 00:56:22,900
before you ever worried about oversight.

1460
00:56:22,900 --> 00:56:24,340
Governance was an afterthought.

1461
00:56:24,340 --> 00:56:27,220
Something you figured out only after the servers were ready running.

1462
00:56:27,220 --> 00:56:28,620
Infrastructure was the big decision

1463
00:56:28,620 --> 00:56:30,540
and governance just followed along behind it.

1464
00:56:30,540 --> 00:56:32,980
In this new model, you choose your governance framework

1465
00:56:32,980 --> 00:56:34,580
before you do anything else.

1466
00:56:34,580 --> 00:56:37,140
You decide that identity will originate in EntraID

1467
00:56:37,140 --> 00:56:39,660
that policy will be enforced through conditional access

1468
00:56:39,660 --> 00:56:41,860
and that compliance will live in purview.

1469
00:56:41,860 --> 00:56:43,620
Only after those rules are set,

1470
00:56:43,620 --> 00:56:45,980
do you figure out where the actual workloads should live.

1471
00:56:45,980 --> 00:56:48,100
Governance is now the foundational decision

1472
00:56:48,100 --> 00:56:50,220
and the infrastructure simply follows.

1473
00:56:50,220 --> 00:56:52,660
This inversion gives Microsoft a massive home field advantage

1474
00:56:52,660 --> 00:56:55,660
because they built their ecosystem around governance from day one.

1475
00:56:55,660 --> 00:56:58,460
They prioritized identity, policy enforcement,

1476
00:56:58,460 --> 00:57:00,980
and compliance frameworks long before they ever worried

1477
00:57:00,980 --> 00:57:02,620
about the underlying hardware.

1478
00:57:02,620 --> 00:57:04,180
AWS took the opposite path

1479
00:57:04,180 --> 00:57:06,180
by building world-class infrastructure first

1480
00:57:06,180 --> 00:57:07,900
and trying to bolt on governance later.

1481
00:57:07,900 --> 00:57:11,140
As a result, AWS governance still feels like a tool

1482
00:57:11,140 --> 00:57:13,340
for managing servers rather than a system

1483
00:57:13,340 --> 00:57:15,220
for managing an entire enterprise.

1484
00:57:15,220 --> 00:57:17,220
When infrastructure is subordinate to governance,

1485
00:57:17,220 --> 00:57:19,740
the provider who owns the rules wins the contract.

1486
00:57:19,740 --> 00:57:23,180
AWS might still be the best infrastructure provider on the planet,

1487
00:57:23,180 --> 00:57:25,220
offering more services, more regions

1488
00:57:25,220 --> 00:57:28,380
and more mature optimization tools than anyone else.

1489
00:57:28,380 --> 00:57:29,700
But here is the uncomfortable truth.

1490
00:57:29,700 --> 00:57:32,260
Enterprises aren't optimizing for infrastructure anymore.

1491
00:57:32,260 --> 00:57:33,740
They are optimizing for control.

1492
00:57:33,740 --> 00:57:35,100
This isn't a temporary trend

1493
00:57:35,100 --> 00:57:36,900
or a passing phase in the industry.

1494
00:57:36,900 --> 00:57:38,780
It is an architectural shift that reflects

1495
00:57:38,780 --> 00:57:40,980
what modern businesses actually need to survive.

1496
00:57:40,980 --> 00:57:43,340
They need to enforce policy consistently

1497
00:57:43,340 --> 00:57:45,020
across every single platform they use

1498
00:57:45,020 --> 00:57:47,540
and they need to prove that compliance to regulators

1499
00:57:47,540 --> 00:57:49,420
with audit trails that cannot be faked.

1500
00:57:49,420 --> 00:57:51,500
These are governance problems, not hardware problems.

1501
00:57:51,500 --> 00:57:54,940
AWS can solve infrastructure problems with brilliant efficiency,

1502
00:57:54,940 --> 00:57:56,260
but they struggle with governance

1503
00:57:56,260 --> 00:57:59,060
because that layer requires owning the identity of the user.

1504
00:57:59,060 --> 00:58:01,260
AWS does not own the identity layer.

1505
00:58:01,260 --> 00:58:02,260
Microsoft does.

1506
00:58:02,260 --> 00:58:04,540
This architectural inversion will only accelerate

1507
00:58:04,540 --> 00:58:06,500
as we move toward 2027.

1508
00:58:06,500 --> 00:58:09,140
As nearly every enterprise adopts a multi-cloud strategy

1509
00:58:09,140 --> 00:58:11,500
and identity replaces the network as the new perimeter,

1510
00:58:11,500 --> 00:58:14,860
governance becomes the only thing that stays constant.

1511
00:58:14,860 --> 00:58:17,020
Infrastructure is becoming interchangeable

1512
00:58:17,020 --> 00:58:19,820
while the control plane is becoming the only strategic asset

1513
00:58:19,820 --> 00:58:20,700
that matters.

1514
00:58:20,700 --> 00:58:23,020
The organization of the future will be built entirely

1515
00:58:23,020 --> 00:58:24,340
around this governance layer.

1516
00:58:24,340 --> 00:58:27,100
You will choose your framework, likely Microsoft,

1517
00:58:27,100 --> 00:58:29,100
and then treat infrastructure providers

1518
00:58:29,100 --> 00:58:30,620
like plug and play components.

1519
00:58:30,620 --> 00:58:33,700
You might run some workloads on AWS, someone Azure

1520
00:58:33,700 --> 00:58:36,620
and keep others on premises, but your policy will be unified.

1521
00:58:36,620 --> 00:58:38,140
Your identity will be centralized

1522
00:58:38,140 --> 00:58:40,060
and your audit trails will be complete.

1523
00:58:40,060 --> 00:58:42,620
That is the reality of the architectural inversion.

1524
00:58:42,620 --> 00:58:44,340
The control plane belongs to Microsoft,

1525
00:58:44,340 --> 00:58:45,780
not because their servers are better,

1526
00:58:45,780 --> 00:58:48,060
but because the servers themselves aren't the point anymore.

1527
00:58:48,060 --> 00:58:49,140
Governance is what matters,

1528
00:58:49,140 --> 00:58:51,220
and Microsoft owns the engine that runs it.

1529
00:58:51,220 --> 00:58:53,860
Still manning AWS, why they still matter.

1530
00:58:53,860 --> 00:58:57,140
AWS is not losing this fight, and I want to be very clear about that.

1531
00:58:57,140 --> 00:58:58,740
What we are seeing is not a defeat,

1532
00:58:58,740 --> 00:59:02,340
but a repositioning of where AWS fits into the stack.

1533
00:59:02,340 --> 00:59:03,980
That distinction matters.

1534
00:59:03,980 --> 00:59:07,580
AWS remains the undisputed heavyweight champion of infrastructure.

1535
00:59:07,580 --> 00:59:09,340
That isn't a controversial opinion.

1536
00:59:09,340 --> 00:59:12,980
It is a measurable fact backed by 15 years of relentless expansion.

1537
00:59:12,980 --> 00:59:16,020
Their advantages aren't just theoretical ideas on a slide deck.

1538
00:59:16,020 --> 00:59:19,220
They are operational realities that companies rely on every single day.

1539
00:59:19,220 --> 00:59:21,180
And if you look at raw service breadth,

1540
00:59:21,180 --> 00:59:24,740
AWS is still in a league of its own with over 230 services.

1541
00:59:24,740 --> 00:59:27,140
They offer everything from basic compute and storage

1542
00:59:27,140 --> 00:59:30,340
to quantum computing and specialized machine learning tools.

1543
00:59:30,340 --> 00:59:31,300
This wasn't an accident,

1544
00:59:31,300 --> 00:59:34,820
but the result of a decade and a half of building an ecosystem so deep

1545
00:59:34,820 --> 00:59:36,580
that if you can imagine a cloud service,

1546
00:59:36,580 --> 00:59:40,180
AWS probably already has a mature version of it.

1547
00:59:40,180 --> 00:59:43,380
Their global footprint is equally dominant spanning 33 regions

1548
00:59:43,380 --> 00:59:45,140
and over 100 availability zones.

1549
00:59:45,140 --> 00:59:47,300
If your application is sensitive to latency

1550
00:59:47,300 --> 00:59:50,900
or you have to meet strict data residency laws in obscure locations,

1551
00:59:50,900 --> 00:59:54,020
AWS is usually the only provider that can actually deliver.

1552
00:59:54,020 --> 00:59:57,140
That kind of reach is incredibly valuable for global enterprises.

1553
00:59:57,140 --> 01:00:00,900
Beyond the hardware, AWS dominates in the maturity of its DevOps tooling.

1554
01:00:00,900 --> 01:00:03,780
Organizations have spent years and millions of dollars

1555
01:00:03,780 --> 01:00:05,940
building automation on top of cloud formation,

1556
01:00:05,940 --> 01:00:08,020
systems manager and code to deploy.

1557
01:00:08,020 --> 01:00:12,020
They have teams of experts who understand the AWS way of doing things down to the bone.

1558
01:00:12,020 --> 01:00:14,660
You don't just throw away that level of institutional knowledge

1559
01:00:14,660 --> 01:00:18,260
and technical investment because a competitor has a better identity plate.

1560
01:00:18,260 --> 01:00:20,420
They also lead the way in cost optimization.

1561
01:00:20,420 --> 01:00:23,860
Between savings plans, spot instances and the compute optimizer,

1562
01:00:23,860 --> 01:00:26,020
AWS gives you the most granular tools

1563
01:00:26,020 --> 01:00:28,420
to squeeze every bit of value out of your spend.

1564
01:00:28,420 --> 01:00:30,260
For a company running at massive scale,

1565
01:00:30,260 --> 01:00:32,820
the visibility and efficiency AWS provides

1566
01:00:32,820 --> 01:00:34,980
can save them tens of millions of dollars a year.

1567
01:00:34,980 --> 01:00:39,700
Even in the AI race, AWS is holding its ground by focusing on the heavy lifting.

1568
01:00:39,700 --> 01:00:43,620
With bedrock, sage maker and their own custom training and inferential chips,

1569
01:00:43,620 --> 01:00:46,580
they provide the raw power for companies that want to build

1570
01:00:46,580 --> 01:00:48,980
and fine tune their own proprietary models.

1571
01:00:48,980 --> 01:00:52,020
They are providing the flexibility that developers crave.

1572
01:00:52,020 --> 01:00:56,180
AWS will continue to dominate these specific areas for the foreseeable future.

1573
01:00:56,180 --> 01:00:58,980
They will likely continue to run more workloads than anyone else

1574
01:00:58,980 --> 01:01:01,540
and maintain the most sophisticated catalog of tools.

1575
01:01:01,540 --> 01:01:03,220
These strengths aren't going anywhere,

1576
01:01:03,220 --> 01:01:05,220
but the repositioning is happening nonetheless.

1577
01:01:05,220 --> 01:01:10,420
AWS is moving from being the cloud to being the infrastructure layer that Microsoft governs.

1578
01:01:10,420 --> 01:01:14,180
This isn't a failure, it's just a different way of being dominant.

1579
01:01:14,180 --> 01:01:15,620
Look at how this works in practice.

1580
01:01:15,620 --> 01:01:19,380
A company might run 80% of its actual compute power on AWS,

1581
01:01:19,380 --> 01:01:21,380
which is a massive win for Amazon's bottom line.

1582
01:01:21,380 --> 01:01:23,940
But that same company uses EntraID for identity,

1583
01:01:23,940 --> 01:01:26,740
conditional access for security and purview for compliance.

1584
01:01:26,740 --> 01:01:28,580
Their audit logs sit in Sentinel

1585
01:01:28,580 --> 01:01:31,060
and their employees use co-pilot for daily tasks.

1586
01:01:31,060 --> 01:01:34,980
In this scenario, the control plane is Microsoft, but the engine room is AWS.

1587
01:01:34,980 --> 01:01:36,420
AWS isn't losing that deal.

1588
01:01:36,420 --> 01:01:40,420
They are winning the workload, providing the storage and running the databases.

1589
01:01:40,420 --> 01:01:43,700
They are the muscle of the operation, even if they aren't the brain.

1590
01:01:43,700 --> 01:01:47,060
They are providing the power while Microsoft provides the permission.

1591
01:01:47,060 --> 01:01:50,660
This is a perfectly sustainable position for AWS to hold for decades.

1592
01:01:50,660 --> 01:01:53,860
They can continue to innovate in silicon, optimize for performance

1593
01:01:53,860 --> 01:01:57,700
and dominate in raw volume without ever needing to own the identity layer.

1594
01:01:57,700 --> 01:02:02,260
They don't have to compete in every single category to be a vital part of the enterprise stack.

1595
01:02:02,260 --> 01:02:05,540
The real question is whether AWS is actually comfortable with this arrangement.

1596
01:02:05,540 --> 01:02:09,060
We have to wonder if they are okay being the utility layer

1597
01:02:09,060 --> 01:02:11,540
that sits underneath another vendor's control plane.

1598
01:02:11,540 --> 01:02:14,180
So far, their response has been to build their own governance tools

1599
01:02:14,180 --> 01:02:17,780
like control tower and guard duty, which are excellent products in their own right.

1600
01:02:17,780 --> 01:02:20,660
The problem is that those tools are AWS-specific.

1601
01:02:20,660 --> 01:02:24,180
They don't reach out and manage your Azure or on-premises environments,

1602
01:02:24,180 --> 01:02:27,140
which means they don't actually abstract the infrastructure layer.

1603
01:02:27,140 --> 01:02:30,820
They aren't designed to compete with Microsoft's cross-platform governance model

1604
01:02:30,820 --> 01:02:33,940
because they are still fundamentally built to sell more AWS.

1605
01:02:33,940 --> 01:02:36,900
For AWS to truly challenge Microsoft's control,

1606
01:02:36,900 --> 01:02:40,420
they would have to fundamentally rethink their entire business model.

1607
01:02:40,420 --> 01:02:43,060
They would have to stop being an infrastructure first company

1608
01:02:43,060 --> 01:02:44,660
and become a governance first company.

1609
01:02:44,660 --> 01:02:49,060
They would need a policy engine that treats AWS, Azure, and Google Cloud as equals.

1610
01:02:49,060 --> 01:02:52,500
Nothing they've done so far suggests they have any interest in doing that.

1611
01:02:52,500 --> 01:02:54,820
So the future looks like a division of labor.

1612
01:02:54,820 --> 01:02:58,020
AWS will remain the best place to run a workload,

1613
01:02:58,020 --> 01:03:00,900
dominating in compute, storage, and database maturity.

1614
01:03:00,900 --> 01:03:04,340
But they will do so while operating underneath Microsoft's control plane.

1615
01:03:04,340 --> 01:03:07,140
It's a world where AWS wins at the hardware level

1616
01:03:07,140 --> 01:03:09,460
and Microsoft wins at the governance level

1617
01:03:09,460 --> 01:03:10,980
that isn't a loss for either side.

1618
01:03:10,980 --> 01:03:12,820
It's just the new architectural reality.

1619
01:03:12,820 --> 01:03:16,340
The hybrid operating model, the enterprise default.

1620
01:03:16,340 --> 01:03:20,260
By 2027, the hybrid operating model will no longer be an aspirational goal

1621
01:03:20,260 --> 01:03:23,700
or a messy exception because it is becoming the enterprise default.

1622
01:03:23,700 --> 01:03:26,900
This is not a speculative prediction about what organizations should do,

1623
01:03:26,900 --> 01:03:29,860
but a statement about what they will actually be doing to survive.

1624
01:03:29,860 --> 01:03:33,460
To understand this shift, we have to look at how the model functions operationally,

1625
01:03:33,460 --> 01:03:37,380
which is quite different from the traditional marketing definition of hybrid cloud.

1626
01:03:37,380 --> 01:03:39,940
Identity now originates directly in Microsoft,

1627
01:03:39,940 --> 01:03:45,540
and rather than being synchronized from on-premises or federated from some aging legacy system,

1628
01:03:45,540 --> 01:03:48,020
Entra ID acts as the absolute source of truth

1629
01:03:48,020 --> 01:03:52,340
where users, groups, and roles exist natively in the cloud from the moment they are created.

1630
01:03:52,340 --> 01:03:56,340
This makes identity the centralized foundation of the entire architecture.

1631
01:03:56,340 --> 01:03:58,340
Policy enforcement follows a similar pattern

1632
01:03:58,340 --> 01:04:00,180
by moving through Azure Arc and Defender

1633
01:04:00,180 --> 01:04:02,020
to reach every corner of the environment.

1634
01:04:02,020 --> 01:04:04,980
On-premises servers, AWS, EC2 instances,

1635
01:04:04,980 --> 01:04:07,860
and Google Cloud VMs all run the Arc agent,

1636
01:04:07,860 --> 01:04:12,100
which allows them to appear in the Azure portal as standard managed resources.

1637
01:04:12,100 --> 01:04:13,860
This creates a single policy framework

1638
01:04:13,860 --> 01:04:16,820
where Azure Policy and Conditional Access apply to every asset,

1639
01:04:16,820 --> 01:04:20,100
regardless of which infrastructure provider is actually hosting the hardware.

1640
01:04:20,740 --> 01:04:22,900
Infrastructure has become interchangeable,

1641
01:04:22,900 --> 01:04:26,340
allowing you to run workloads on AWS for compute pricing,

1642
01:04:26,340 --> 01:04:28,900
or Azure for M365 integration,

1643
01:04:28,900 --> 01:04:32,260
while keeping latency sensitive tasks on-premises.

1644
01:04:32,260 --> 01:04:35,140
While the underlying infrastructure remains heterogeneous,

1645
01:04:35,140 --> 01:04:37,300
the governance layer is entirely unified.

1646
01:04:37,300 --> 01:04:40,500
Unified governance means you operate with one identity system,

1647
01:04:40,500 --> 01:04:44,740
one policy engine, and one-ordered trail across every cloud provider you use.

1648
01:04:44,740 --> 01:04:46,340
Pervue classifies data everywhere,

1649
01:04:46,340 --> 01:04:50,340
while DLP and Sentinel monitor access and prevent leaks without ever caring

1650
01:04:50,340 --> 01:04:52,340
about traditional infrastructure boundaries.

1651
01:04:52,340 --> 01:04:54,820
Governance is no longer about where the data lives,

1652
01:04:54,820 --> 01:04:56,820
but about how the policy is enforced.

1653
01:04:56,820 --> 01:05:00,660
This model addresses the most painful problems facing the modern enterprise

1654
01:05:00,660 --> 01:05:02,900
by ensuring compliance is never fragmented.

1655
01:05:02,900 --> 01:05:07,220
Instead of managing separate audit trails for Azure, AWS, and local data centers,

1656
01:05:07,220 --> 01:05:10,740
you maintain a single source of truth that makes compliance provable to regulators.

1657
01:05:10,740 --> 01:05:15,140
Costs are optimized because you are no longer locked into a single provider,

1658
01:05:15,140 --> 01:05:19,620
giving you the freedom to shift workloads based on current pricing or performance needs.

1659
01:05:19,620 --> 01:05:22,260
You can keep predictable workloads on hardware you own

1660
01:05:22,260 --> 01:05:26,900
while bursting elastic tasks to whichever cloud offers the best rate at that specific moment.

1661
01:05:26,900 --> 01:05:29,140
Security shifts to an identity first model,

1662
01:05:29,140 --> 01:05:32,740
where the network perimeter is replaced by EntraID and conditional access.

1663
01:05:32,740 --> 01:05:35,940
Every access decision is evaluated based on context,

1664
01:05:35,940 --> 01:05:37,940
device compliance, and risk signals,

1665
01:05:37,940 --> 01:05:39,940
which effectively prevents lateral movement

1666
01:05:39,940 --> 01:05:43,140
by ensuring every single action is logged and auditable.

1667
01:05:43,140 --> 01:05:46,180
Agility is preserved because you can swap infrastructure providers

1668
01:05:46,180 --> 01:05:50,740
or migrate workloads between clouds without ever re-architecting your identity system

1669
01:05:50,740 --> 01:05:52,580
or changing your policy framework.

1670
01:05:52,580 --> 01:05:55,300
Infrastructure becomes a variable that you can change at will

1671
01:05:55,300 --> 01:05:57,140
while governance remains the only constant.

1672
01:05:57,140 --> 01:05:59,380
AWS cannot provide this level of abstraction

1673
01:05:59,380 --> 01:06:01,220
because they do not own the governance layer,

1674
01:06:01,220 --> 01:06:06,020
whereas Microsoft owns the identity, policy, and compliance tools required to unify the stack.

1675
01:06:06,020 --> 01:06:08,100
By abstracting the infrastructure layer,

1676
01:06:08,100 --> 01:06:10,260
Microsoft has replaced it with a control plane

1677
01:06:10,260 --> 01:06:12,500
that enterprises find functionally necessary.

1678
01:06:12,500 --> 01:06:14,500
This is the default reality for 2027,

1679
01:06:14,500 --> 01:06:17,300
not because Microsoft is forcing the hand of the enterprise

1680
01:06:17,300 --> 01:06:21,460
but because the model solves the fundamental problems of cost, security, and compliance.

1681
01:06:21,460 --> 01:06:25,940
Once an organization unifies its governance across a hybrid footprint,

1682
01:06:25,940 --> 01:06:28,340
the cost of switching away becomes astronomical.

1683
01:06:28,340 --> 01:06:32,020
Removing EntraID or Azure Arc would mean dismantling the entire security

1684
01:06:32,020 --> 01:06:33,460
and compliance engine of the company.

1685
01:06:33,460 --> 01:06:37,380
The hybrid operating model locks enterprises into Microsoft's control plane

1686
01:06:37,380 --> 01:06:38,660
through functional necessity,

1687
01:06:38,660 --> 01:06:41,780
effectively making it the operating system for the modern business.

1688
01:06:42,420 --> 01:06:43,620
The prediction.

1689
01:06:43,620 --> 01:06:46,660
Enterprise operating reality by 2028.

1690
01:06:46,660 --> 01:06:50,580
By 2028, the cloud market will be completely reorganized

1691
01:06:50,580 --> 01:06:53,060
around control planes rather than infrastructure providers.

1692
01:06:53,060 --> 01:06:55,780
This shift is inevitable because of the architectural forces

1693
01:06:55,780 --> 01:06:57,860
currently in motion across the industry.

1694
01:06:57,860 --> 01:07:00,980
AWS will likely still dominate the world of cloud compute

1695
01:07:00,980 --> 01:07:04,340
by running more global workloads and offering a broader service catalog

1696
01:07:04,340 --> 01:07:05,940
than any of its competitors.

1697
01:07:05,940 --> 01:07:09,540
For organizations building cloud native applications from the ground up,

1698
01:07:09,540 --> 01:07:12,980
AWS will remain the primary choice due to a structural dominance

1699
01:07:12,980 --> 01:07:14,660
that is incredibly durable.

1700
01:07:14,660 --> 01:07:18,660
Microsoft, however, will define the actual operating reality for the enterprise

1701
01:07:18,660 --> 01:07:21,540
which represents a much more fundamental type of dominance.

1702
01:07:21,540 --> 01:07:25,060
By 2028, CIOs will measure their success through governance metrics

1703
01:07:25,060 --> 01:07:27,060
instead of focusing on infrastructure statistics.

1704
01:07:27,060 --> 01:07:29,780
They will stop asking how many workloads are running on AWS

1705
01:07:29,780 --> 01:07:32,100
and start asking what percentage of access decisions

1706
01:07:32,100 --> 01:07:34,340
are being evaluated by conditional access.

1707
01:07:34,340 --> 01:07:36,820
The primary concern will shift from Azure compute spend

1708
01:07:36,820 --> 01:07:40,100
to the number of data classification policies being enforced through PerView.

1709
01:07:40,100 --> 01:07:42,100
Governance becomes the true measure of success

1710
01:07:42,100 --> 01:07:44,500
while infrastructure is relegated to the substrate.

1711
01:07:44,500 --> 01:07:47,780
Compliance will move from a manual process to an automated one

1712
01:07:47,780 --> 01:07:51,380
where organizations no longer spend months preparing for a single audit.

1713
01:07:51,380 --> 01:07:53,620
Continuous compliance reports will be the norm

1714
01:07:53,620 --> 01:07:55,860
with PerView classifying data in real time

1715
01:07:55,860 --> 01:07:58,740
and DLP preventing violations before they can even happen.

1716
01:07:58,740 --> 01:08:01,060
Regulators will simply audit a live dashboard

1717
01:08:01,060 --> 01:08:02,900
to see policy enforcement in action,

1718
01:08:02,900 --> 01:08:06,260
making compliance a provable fact rather than a theoretical goal.

1719
01:08:06,260 --> 01:08:10,180
Identity will fully replace the network as the primary security perimeter.

1720
01:08:10,180 --> 01:08:12,980
Organizations will stop trying to defend network boundaries

1721
01:08:12,980 --> 01:08:14,980
and focus entirely on the identity boundary

1722
01:08:14,980 --> 01:08:18,180
where every user and device is evaluated by conditional access.

1723
01:08:18,180 --> 01:08:20,820
When every access request is authenticated through EntraID

1724
01:08:20,820 --> 01:08:22,820
and checked for compliance, the underlying network

1725
01:08:22,820 --> 01:08:24,740
becomes architecturally irrelevant.

1726
01:08:24,740 --> 01:08:28,260
Policy will be treated as code rather than a collection of word documents

1727
01:08:28,260 --> 01:08:29,460
or manual processes.

1728
01:08:29,460 --> 01:08:31,700
Azure policy will enforce rules that propagate

1729
01:08:31,700 --> 01:08:33,780
and remediate violations automatically,

1730
01:08:33,780 --> 01:08:36,100
allowing policy to become version controlled,

1731
01:08:36,100 --> 01:08:39,940
auditable and part of the standard infrastructure as code workflow.

1732
01:08:39,940 --> 01:08:43,700
Hybrid setups will be the default for 90% of organizations,

1733
01:08:43,700 --> 01:08:46,260
making single cloud environments a rare exception.

1734
01:08:46,260 --> 01:08:49,140
The question will no longer be whether an organization should be hybrid

1735
01:08:49,140 --> 01:08:52,180
but rather which infrastructure providers can best fit

1736
01:08:52,180 --> 01:08:54,660
within their existing hybrid governance model.

1737
01:08:54,660 --> 01:08:56,660
AWS will adapt to this new reality

1738
01:08:56,660 --> 01:08:58,580
by deepening its integration with Microsoft

1739
01:08:58,580 --> 01:09:00,660
to offer better federation with EntraID

1740
01:09:00,660 --> 01:09:02,820
and stronger support for defender for cloud.

1741
01:09:02,820 --> 01:09:04,820
It will become easier to project Azure governance

1742
01:09:04,820 --> 01:09:08,420
onto AWS infrastructure as the two companies become more complementary.

1743
01:09:08,420 --> 01:09:10,980
AWS will remain the preferred infrastructure layer

1744
01:09:10,980 --> 01:09:13,940
while Microsoft solidifies its position as the governance layer.

1745
01:09:13,940 --> 01:09:16,580
The control plane will remain firmly in Microsoft's hands

1746
01:09:16,580 --> 01:09:19,220
because AWS is not building a competing framework

1747
01:09:19,220 --> 01:09:21,300
that can span across multiple clouds

1748
01:09:21,300 --> 01:09:23,220
and on-premises environments.

1749
01:09:23,220 --> 01:09:25,300
AWS remains an infrastructure first company

1750
01:09:25,300 --> 01:09:28,100
while Microsoft has pivoted to a governance first strategy

1751
01:09:28,100 --> 01:09:30,420
and that architectural gap is not going to close.

1752
01:09:30,420 --> 01:09:34,580
By 2028 enterprises will see this arrangement as the optimal way to run a business.

1753
01:09:34,580 --> 01:09:37,380
They might run 70% of their compute on AWS

1754
01:09:37,380 --> 01:09:40,820
while managing every bit of it through the Microsoft control plane.

1755
01:09:40,820 --> 01:09:42,500
There is no contradiction in this setup

1756
01:09:42,500 --> 01:09:45,060
because it allows a company to use the best infrastructure

1757
01:09:45,060 --> 01:09:46,900
alongside the best governance tools.

1758
01:09:46,900 --> 01:09:49,300
This is the enterprise reality of 2028

1759
01:09:49,300 --> 01:09:51,620
where the conversation shifts from which cloud

1760
01:09:51,620 --> 01:09:53,860
to how do we govern across all clouds.

1761
01:09:53,860 --> 01:09:56,260
AWS will still be winning the infrastructure race

1762
01:09:56,260 --> 01:09:58,260
but Microsoft will be the one defining

1763
01:09:58,260 --> 01:09:59,860
what winning actually looks like.

1764
01:09:59,860 --> 01:10:01,620
Conclusion.

1765
01:10:01,620 --> 01:10:03,620
The control plane is the battleground.

1766
01:10:03,620 --> 01:10:05,780
AWS won the infrastructure war

1767
01:10:05,780 --> 01:10:07,940
and that is now a matter of historical record.

1768
01:10:07,940 --> 01:10:11,220
They dominate cloud compute by running more global workloads

1769
01:10:11,220 --> 01:10:12,660
than any competitor

1770
01:10:12,660 --> 01:10:16,660
and their lead in services and regions remains undisputed.

1771
01:10:16,660 --> 01:10:17,860
AWS won.

1772
01:10:17,860 --> 01:10:21,060
Microsoft is winning the control plane war

1773
01:10:21,060 --> 01:10:23,860
which is the battle currently deciding the fate of the enterprise.

1774
01:10:23,860 --> 01:10:26,260
This is where identity, policy and governance live

1775
01:10:26,260 --> 01:10:28,500
and it is exactly where Microsoft's gravity

1776
01:10:28,500 --> 01:10:30,100
pulls the largest organizations.

1777
01:10:30,100 --> 01:10:32,900
In the enterprise the control plane is the only thing that matters

1778
01:10:32,900 --> 01:10:34,980
because infrastructure has become a commodity

1779
01:10:34,980 --> 01:10:36,660
while governance remains scarce.

1780
01:10:36,660 --> 01:10:39,540
By 2027, nine out of ten organizations

1781
01:10:39,540 --> 01:10:41,140
will operate in hybrid environments

1782
01:10:41,140 --> 01:10:44,100
where unified governance always beats distributed services.

1783
01:10:44,100 --> 01:10:45,700
Microsoft owns governance

1784
01:10:45,700 --> 01:10:47,620
and while AWS owns infrastructure,

1785
01:10:47,620 --> 01:10:50,740
the enterprise will always choose the path of unified control.

1786
01:10:50,740 --> 01:10:53,220
Drop a comment if you think AWS can actually mount

1787
01:10:53,220 --> 01:10:54,740
a control plane comeback.

1788
01:10:54,740 --> 01:10:56,340
Subscribe for the architectural takes

1789
01:10:56,340 --> 01:10:58,100
that nobody else is willing to give you.

Mirko Peters Profile Photo

Founder of m365.fm, m365.show and m365con.net

Mirko Peters is a Microsoft 365 expert, content creator, and founder of m365.fm, a platform dedicated to sharing practical insights on modern workplace technologies. His work focuses on Microsoft 365 governance, security, collaboration, and real-world implementation strategies.

Through his podcast and written content, Mirko provides hands-on guidance for IT professionals, architects, and business leaders navigating the complexities of Microsoft 365. He is known for translating complex topics into clear, actionable advice, often highlighting common mistakes and overlooked risks in real-world environments.

With a strong emphasis on community contribution and knowledge sharing, Mirko is actively building a platform that connects experts, shares experiences, and helps organizations get the most out of their Microsoft 365 investments.