Workflow
Microsoft Intune
icon
Search documents
Levi Strauss Taps Microsoft to Build ‘AI Superagent' for Operations
PYMNTS.com· 2025-11-18 01:21
Core Insights - Levi Strauss & Co. is collaborating with Microsoft to create an enterprise superagent aimed at enhancing employee support, optimizing retail operations, and modernizing the company's data infrastructure [1][2] - The Azure-native orchestrator will function within Microsoft Teams, managing requests across various departments, which is part of Levi's transition to a "fan-obsessed, direct-to-consumer first business" model [2][4] - The superagent is expected to centralize employee inquiries and operational tasks into a single conversational interface, thereby improving support efficiency for both store associates and corporate teams [2][6] Modernization Strategy - The initiative is part of a larger modernization strategy that includes the deployment of Surface Copilot+ PCs, GitHub Copilot, and Microsoft Intune, alongside migrating workloads to Microsoft Azure [3] - The company is utilizing Azure Migrate, Azure AI Foundry, and Semantic Kernel to facilitate automation while maintaining a zero-trust security framework [3] AI Adoption in Retail - The partnership reflects a broader trend among retailers to adopt agentic AI in both internal and customer-facing operations, with Levi's consumer tools also built on the same data foundations [4][5] - The new Outfitting feature leverages existing integrations with inventory data and customer behavior to provide personalized styling recommendations [4] Competitive Landscape - Levi's AI-powered associate assistant, Stitch, offers store employees immediate access to essential product information and training resources [5] - The company's move to develop its own orchestrator aligns with competitors like Amazon and Walmart, indicating a shift among legacy apparel brands towards similar operational architectures [5] Implementation Timeline - The superagent is set to begin global rollout in early 2026, with expectations of enhanced productivity and improved alignment across stores, supply chains, and digital channels [6]
Splashtop Enhances Microsoft® Intune® and Microsoft® Entra® to Deliver Greater Security and Control in Hybrid Workspaces
Globenewswire· 2025-11-17 17:00
CUPERTINO, Calif., Nov. 17, 2025 (GLOBE NEWSWIRE) -- At the Microsoft Ignite 2025 event, Splashtop announced rising adoption of its solutions designed to make Microsoft Intune® and Microsoft Entra® more powerful for modern IT environments. As organizations expand use of Microsoft cloud services, Splashtop is gaining traction as a complementary platform providing remote access, passwordless authentication, remote support, and real-time endpoint automation to hybrid organizations. These capabilities align wit ...
Microsoft (MSFT) 2025 Conference Transcript
2025-08-28 17:32
Summary of Microsoft Security Conference Call Company Overview - **Company**: Microsoft - **Industry**: Cybersecurity Key Points and Arguments Microsoft Security Business - Microsoft has the largest security business globally, with a comprehensive portfolio that includes six product families: threat protection, identity management, device management, data security, and generative AI security solutions [6][7][8] Current Cybersecurity Challenges 1. **Threat Landscape**: - Unprecedented levels of cyber threats, with password attacks increasing from 4,000 per second last year to 7,000 this year, totaling 600 million attacks daily [11][12] - Attackers can infiltrate organizations in an average of 72 minutes [13] - The cybercrime economy is valued at $9.2 trillion annually, with a 5x increase in tracked unique attackers from 300 to 1,500 [13] 2. **Data Risks**: - 20% of data breaches are caused by insiders, and over 80% of leaders express concern about data security, especially with the rise of AI [14] 3. **Complexity**: - Organizations typically use over 40 security tools, leading to fragmentation and complexity in security management [15][16] Trends and Solutions - **Generative AI**: - AI is being leveraged for both enhancing security measures and protecting AI systems themselves [17] - **Consolidation and Simplification**: - The need for end-to-end protection and integration of security solutions is emphasized [17] Microsoft’s Differentiation - **Signal Processing**: - Microsoft processes 84 trillion signals daily, a tenfold increase from five years ago, providing deep threat intelligence [20][21] - **Comprehensive Portfolio**: - Microsoft offers a broad range of integrated security solutions across 50 categories, ensuring holistic protection [22][23] - **Best of Breed Solutions**: - Microsoft leads in 19 security categories, showcasing its commitment to quality and innovation [23] AI and Security - AI is transforming the threat landscape, with attackers using AI for faster and more sophisticated attacks, including phishing and identity theft [29][30] - Microsoft is focused on protecting the entire AI stack and using AI to enhance its security measures [32][33] Collaborative Ecosystem - Microsoft emphasizes collaboration within the security industry, launching agents developed by partners to enhance its security offerings [36][40] Secure Future Initiative - Launched in 2023, this initiative focuses on Zero Trust principles and aims to integrate security into every aspect of Microsoft’s operations, with 34,000 engineers dedicated to this project [41][44][46] Market Position and Shareholder Value - Security is a top priority for organizations, making it a defensible investment that directly impacts shareholder value [65][66] - Microsoft’s security innovations are expected to drive customer value and maintain a competitive edge in the market [66][67] Final Thoughts - Microsoft is actively securing 2 million applications with its Defender product and is committed to enhancing its security portfolio, particularly in the realm of generative AI [68][69] Additional Important Content - The discussion highlights the critical role of security in enabling trust and operational efficiency within organizations, emphasizing that without security, the functionality of technology is severely compromised [63][64]