Enterprise Mobility and Security Blog

RSS

How-to protect business apps and data on mobile devices

This is the fifth and final installment in my blog series on mobile device management (MDM) by using Microsoft System Center 2012 R2 Configuration Manager and Windows Intune. In this post, I’ll like to talk about how-to protect business apps and data on mobile devices. Access control Of course, security is always best implemented as defense in-depth,...

Continue reading

How-to deploy apps to mobile devices

This is the fourth installment in my series on mobile device management (MDM) using Microsoft System Center 2012 R2 Configuration Manager and Windows Intune. If you haven’t read the previous three posts: preparing for mobile device management, how-to perform device enrollment for mobile devices, and how-to configure mobile devices settings, you should check them out! In this...

Continue reading

How-to configure mobile device settings

This is the third blog post in my five-part series on mobile device management (MDM). If you missed the first two parts: preparing for mobile device management and how-to perform device enrollment for mobile device management, I invite you to check them out.  Today, I’m going to talk about configuring mobile device settings by using...

Continue reading

Nitro is integrating with Microsoft RMS to protect your PDF documents

Folks, Document security is the top priority for any company with information they’d like to keep private. Microsoft’s Rights Management Services, aka RMS, protects files at the file level. And now, Nitro, a digital document solution is integrating with Microsoft RMS, so Nitro can offer protection for your PDF documents. I had a conversation with...

Continue reading

Preparing for Mobile Device Management

Over the next few days, I’ll be writing a series of blog posts about mobile device management (MDM). Microsoft’s focus is on providing best-in-class mobile and cloud services. Today, everyone has a mobile device, whether it’s a tablet, convertible, laptop, or smartphone. Users are never out of touch with one another and their information. But...

Continue reading

Announcement: Azure RMS Documentation Library Update for May 2014

Hi everybody As per Carol’s introduction post, she's letting you know what's new and hot in the docs for this month. Reminders: Follow us on twitter (@TheRMSGuy) and join in our new RMS peer community at www.yammer.com/AskIPTeam. Cheers,     Dan (on behalf of the RMS team) The Documentation Library for Azure Rights Management has been updated on...

Continue reading

Mitchells and Butlers boosts service and satisfaction with managed mobile platform

Established in 1898, Mitchells & Butlers runs many of the United Kingdom’s most famous restaurant and pub brands. Every year, Mitchells & Butlers’ retail teams serve approximately 130 million meals and 410 million drinks.  Behind the great food and memorable experiences served up daily at every Mitchells & Butlers establishment, technology plays a significant supporting...

Continue reading

How The Walsh Group gained agility and scalability by moving to public cloud

The Walsh Group is responsible for some of the largest construction projects in the world, including air traffic control towers, highways, bridges, stadiums, casinos, wastewater treatment plants, rapid transit systems, universities, and correctional facilities. Although Walsh depends on modern IT systems to run its business, management wants every possible penny of its capital budget to...

Continue reading

Identity and Access Management for the Cloud

Our last blog post on On-boarding to the Cloud discussed extending your on-premises directory into the cloud with Microsoft Azure Active Directory (Azure AD).  Today we’ll talk about some of the additional benefits you and your users can benefit from by using Azure AD, along with Azure AD Premium. For Microsoft, the cloud is not...

Continue reading

On-boarding to the Cloud

In our last blog post on Consistent Identity in the Data Center, we discussed having a consistent directory service within your own infrastructure. Today, we’ll discuss how to extend that directory into the cloud. When you look at managing identity in the cloud, you need to make some initial decisions. Of course, you can always...

Continue reading