Enterprise Mobility and Security Blog

RSS

With smartphones, tablets, laptops, and PCs, people have an increasing number of options for getting and staying connected at any time. Users expect the freedom to access their corporate email and documents from anywhere on any device–and they expect the experience to be seamless and modern. This means IT needs to make sure that corporate data is secure while enabling users to stay productive in today’s mobile-first world, where the threat landscape is increasingly complex and sophisticated.

Safeguard your resources with advanced risk-based conditional access

In more than 60 percent of data breaches, attackers gain corporate network access through weak, default, or stolen user credentials. Microsoft’s identity-driven security approach protects your organization at the front door by managing and protecting your identities—with special attention to sensitive privileged accounts.

Conditional access from Enterprise Mobility + Security (EMS) harnesses the power of Azure Active Directory Premium and Microsoft Intune to provide the control you need to keep your corporate data secure, while giving your people an experience that allows them to do their best work from any device.

With conditional access, you can define adaptive policies that limit access to your corporate data based on location, device and user state, and application sensitivity. Plus, our machine learning-based Azure AD Identity Protection, which leverages billions of signals daily, can detect suspicious behavior and apply risk-based conditional access that protects your applications and critical company data in real time. As conditions change, controls are triggered that allow, block access, or challenge users with Multi-Factor Authentication, device enrollment or password change–ensuring that only trusted users on compliant devices can access sensitive corporate data.

Get a closer look at conditional access

In the coming weeks, we’ll be sharing more about the innovative vision behind EMS’ approach to conditional access. Check back here for a deeper look at each of the conditional layers that you can set policy around; including:

  • User/Location
  • Device
  • Application
  • Risk

In the meantime, here are three must read articles which will tell you more about what we’re delivering with conditional access:

Check out conditional access at Ignite

If you’re in Atlanta, GA attending Microsoft Ignite, be sure to check out today’s Secure access to Office 365, SaaS, and on-premises apps and files with Azure AD and Intune, where we’ll show you how to configure conditional access policies to ensure that only authorized users, devices, and apps can access corporate resources both on-premises and in the cloud. And you don’t want to miss Thursday’s Azure AD Identity Protection session where we’ll show you how to use the power of conditional access and advanced risk analytics, and just-in-time administration and security reviews to stop cyber criminals from gaining entry to your systems. If you couldn’t make it to Atlanta for Ignite, session recordings will be available after the event.

Additional resources:

Submit feedback and suggestions to the Intune engineering team

Find technical resources for Intune in the TechNet library

Sign up for a free trial of Microsoft Intune

Subscribe to the Intune blog RSS feed

Follow us on Twitter