Emad Adel Hanna

I am a Cloud Solution Architect

Emad Adel

With over 15 years of experience in IT, I am a seasoned cloud solution architect and a Microsoft Certified Trainer. I currently work at KlayyTech, a leading IT company that provides cloud services and solutions to clients across various industries.
Erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper.

  • Cairo, Egypt
  • +20-12-4892008, +20-016-3008167
  • me@emadadel.com
  • it.emadadel@hotmail.com
  • www.emadadel.com
Me

My Professional Skills

I have successfully led numerous cloud migration projects, ensuring a smooth transition from on-premises to cloud-based environments. I also have expertise in cloud security and compliance, ensuring data protection and regulatory adherence. .

Microsoft Azure 90%
Microsoft 365 95%
Amazon AWS 70%
Enterprise Architect 60%

Training Services

I give people practical skills and knowledge for the workplace. It can help and improving their skills (Azure ,AWS , Microsoft 365 and SharePoint ).

IT consultant services

Helping businesses use technology to achieve their goals. and offer expertise in areas like cloud computing, cybersecurity, and software selection, and can improve efficiency, reduce risk, and save costs..

Professional Services

As and Azure expert and microsoft 365, I provide the best services, support and advice for all things Microsoft (Microsoft migration, support, and optimisation services).

Enterprise Architect services

help organizations align their IT infrastructure with business strategy. They basically design, evaluate, and build a blueprint for how technology supports the company's goals..

0
Completed project
0
Certifications Award
0
Success Training and Sessions
Completed Consultant projects
  • On Premise vs Public Cloud vs Private Cloud vs multi-cloud : Which One Is Best and Why?

     


    The cloud revolution has transformed how businesses store and access data. But with various deployment models available, choosing the right option can be overwhelming. Let's explore the key differences between on-premise, public cloud, private cloud, and multi-cloud solutions.

    • On-Premise:  Imagine your own data center. You have complete control over hardware, software, and security, ideal for highly sensitive data. However, the upfront costs for infrastructure and IT staff are significant, and scalability is limited.


    • Public Cloud: Think shared office space. You rent resources from providers like Amazon Web Services (AWS) or Microsoft Azure. This offers low upfront costs, high scalability, and easy management. However, customization is limited, and security requires a shared responsibility model.


    Private Cloud: This is like having a dedicated floor in a high-rise. You have a cloud environment built just for your organization, either on-premise or managed by a provider. It offers a high degree of control and customization, along with better scalability than on-premise. However, there are still ongoing fees and some IT expertise is needed.


    • Multi-Cloud: Imagine working from multiple co-working spaces. This approach combines resources from various public clouds and potentially private clouds. It offers increased flexibility, redundancy, and potentially lower costs by leveraging provider strengths. But managing multiple cloud environments can be complex, and vendor lock-in for specific services remains a concern.



    Feature

    On-Premise

    Public Cloud

    Private Cloud

    Multi-Cloud

    Location

    On-site

    Shared infrastructure

    Dedicated infrastructure

    Multiple locations

    Control & Customization

    Highest

    Limited

    High (with some shared)

    Varies

    Cost (Upfront)

    High

    Low

    Lower

    Varies

    Scalability

    Low

    High

    High (depends on setup)

    High

    Security

    Managed by you

    Shared responsibility

    High control

    Requires careful mgmt

    Pros

    Maximum control, security

    Cost-effective, scalable

    Control, customization

    Flexibility, redundancy

    Cons

    High cost, limited scale

    Limited control, vendor lock-in

    More expensive than public

    Increased complexity




    Choosing the right cloud model depends on your specific needs. Consider factors like security requirements, budget, IT expertise, and desired control and scalability. By understanding the pros and cons of each option, you can make an informed decision that empowers your business in the cloud era.

  • Microsoft Copilot For Security Community

     

    What is Microsoft Copilot for Security?



    Microsoft Copilot for Security (Copilot for Security) is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale.

    Copilot for Security provides a natural language, assistive copilot experience. Copilot for Security helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management.

    The official Copilot for Security GitHub Community was just released by the team! Lots and lots of guidelines, logic applications, seminars, examples, and prompting materials. 

    Microsoft Copilot for Security is a generative AI-powered assistant for daily operations in security and IT that empowers teams to protect at the speed and scale of AI.


    🔥 The URL is lnkd.in/epnqccq8.

  • What is The Azure Monitor Agent (AMA) ?

    The Azure Monitor Agent (AMA) is a tool that collects monitoring data from the guest operating system of Azure and hybrid virtual machines. It then delivers this data to Azure Monitor, which can be used by various features, insights, and other services like Microsoft Sentinel and Microsoft Defender for Cloud¹. 
    AMA is designed to replace all of Azure Monitor's legacy monitoring agents. It offers several benefits, including cost savings through targeted data collection rules, simpler management, and enhanced security with Managed Identity and Microsoft Entra tokens¹. 

    It's important to note that the Log Analytics agent is on a deprecation path and won't be supported after August 31, 2024. Therefore, if you're using the Log Analytics agent, you should migrate to the new Azure Monitor agent before that date¹.

  • User Consent Settings in Microsoft 365

    User Consent Settings in Microsoft 365

    When it comes to applications that request access to your organization's data, managing user consent is crucial. Here's how you can configure and control user consent settings:

    1. **Default Behavior**:
       - By default, all users are allowed to consent to applications for permissions that don't require administrator approval.
       - However, to reduce the risk of malicious apps gaining access to your organization's data, consider allowing user consent only for applications published by verified publishers.

    2. **Configuring User Consent**:
       - Sign in to the **Microsoft Entra admin center** as a **Global Administrator**.
       - Navigate to **Identity > Applications > Enterprise applications > Consent and permissions > User consent settings**.
       - Choose the consent setting you want to configure for all users (e.g., allow or restrict user consent).
       - Save your settings.

    3. **Admin Approval Workflow**:
       - If you disable user consent, admins must consent to apps before users can use them.
       - Set up an **admin consent workflow** in the Microsoft Entra admin center so users can request admin approval for blocked apps.

    Remember that users can grant access only to apps they own, and they can't give an app access to other users' information.



  • What is Microsoft Entra ?

    Microsoft has introduced a new product family called Entra. This encompasses Azure AD as well as two novel product categories: Cloud Infrastructure entitlement management (CIEM) and decentralized identity. These products aim to facilitate secure access for all by offering identity and access management, cloud infrastructure entitlement management, and identity verification services.


    Additionally, we are pleased to announce new solutions and products within the Entra family.


    The key benefits of these offerings can be summarized as follows:


    1. Mitigation of risks associated with cloud access

    2. Decentralized identity community

    3. Automated critical identity governance

  • BaaS vs. FaaS: Explaining the Two Serverless Architectures

    In this article, we will discuss the unique features of two primary serverless architectures:

    BaaS (Backend as Service) and FaaS (Function as Service). Function as Service (FaaS) 

    The Backend as Service (BaaS) cloud computing services have varying purposes and come with range of pros and cons.

    BaaS vs. FaaS

    BaaS and FaaS have unique purposes and can work together effectively in the development of serverless applications. BaaS specializes in handling the technical backend of applications, while FaaS enables the running of independent functions in the cloud.


     In Serverless Architecture there are two main types of services: -

    • Function as a Service (FaaS).
    • Backend as a Service (BaaS).

    • What is Function as a Service?

    Function as a Service is a type of service in which all features of application are deploy into individual single feature and then each feature is individually hosted by the provider.By using function as a service you can build your application into single independent features.

    To host the application on the internet,it needs some kind of virtual server infrastructure.Also it involves managing of operating system,web servers,etc.In function as a Service,all these things are managed by provider and not by consumer.

    There are different providers like Amazon Web Service,Microsoft Azure,Google Cloud Platform, IBM who manage virtual server and software processes.

    • What is Backend as a Service (BaaS)

    BaaS is a previously famous cloud-based computing model, that automates and manages the backend side of a web or mobile application development.

    Now, mainly known as its latest approach – Mobile Backend as a Service (MBaaS), it helps developers with data and files storage, messaging and push notifications, a social networking integration, and their configuration and supervision.

    MBaaS is an exercise of employing service providers to work on the backend services for all the technical infrastructure essential for a stable application development via custom SDKs and APIs.


     

    • List of Top FaaS Providers

      • AWS Lambda
      • Cloud Functions | Google Cloud
      • IBM OpenWhisk
      • IronWorker
      • Joyent Manta Functions
      • Microsoft Azure functions
      • PubNub BLOCKS
      • Serverless Docker
    • List of Top BaaS Providers

      • Kumulos
      • Firebase
      • Back4app
      • Azure
      • Parse
      • Hasura
      • Kinvey
      • Firebase
      • Linx
      • Leancloud

    References:-

    ·      https://headmelted.com/serverless-showdown-4a771ca561d2

    ·      https://developer.ibm.com/tv/serverless-vs-functions-service-whats-difference/

    ·      https://dashbird.io/blog/top-function-as-a-service-faas-providers/

  • What's the difference between Office Web Apps and Office Online?



     


    The Product Compatibility Matrix for Office Online Server and Office Web Apps Server can be found here.
    ProductOffice Web Apps ServerOffice Online Server
    SharePoint Server 2013
    Yes
    Yes*
    SharePoint Server 2016
    No
    Yes
    Lync Server 2013
    Yes
    Yes
    Skype for Business Server 2015
    Yes
    Yes
    Exchange Server 2013
    No
    No
    Exchange Server 2016
    No
    Yes


    *Note that SharePoint Server 2013 cannot use the Excel Online external data connectivity and data refresh functionality in Office Online Server. That's only available with SharePoint Server 2016.