Success with Enterprise Mobility

Today my friend Kevin Remde released the latest video about Enterprise Mobility where he interviews Brad Anderson. This is a very good time to talk about this, mainly after we released all three episodes about BYOD, which helps to set the foundation for this conversation and now you can move on beyond BYOD in order…


Using EMS to Mitigate Data Leakage in BYOD Scenarios

One of the biggest challenge in BYOD is to keep company’s data secure and isolated from user’s personal data. You need to preserve user’s privacy while maintain corporate information available and secure in the same device. EMS leverages Azure RMS capabilities to provide data classification and protection, which means that even if the data is…


New Documentation for Microsoft Intune November 2014 Release

New Documentation for Microsoft Intune November 2014 Release Today our Intune content team released a series of new articles about the enhancements introduced this month with the recent November update for Microsoft Intune. For more information about these capabilities see the links below: Microsoft Intune administrative console enhancements Control access to on-premises Microsoft Exchange with…


Leveraging EMS Capabilities for Incident Response

When you embrace a mobile workforce, the way the company should handle incidents will not change the core foundation (assuming there is a process in place and the user knows how to report the incident), but it will include a series of new considerations. You can review this curation that I created with some good…


Countermeasure for BYOD Threats – Real World Scenario

One year ago I was speaking at Microsoft CSO (Chief Security Officer) Council – Fall 2013 in Redmond, during that opportunity I also had a chance to record an interview with Tim Rains where we discussed some results from the Security Intelligence Report V15. Almost one year later, the main subject of that presentation keep…


Private Cloud Security Considerations for Enterprise IT

Today I’m pleased to announce that we published the latest version of this document. We worked together with Microsoft Consultants and Architects to review our original article and the result is this 80 pages long Considerations Guide. You can download this document from the link below: https://gallery.technet.microsoft.com/Private-Cloud-Security-ce808498


Complete BYOD Series at TechNet Radio

Happy Halloween y’all! Yesterday the third and last episode of the BYOD series was released at TechNet Radio. In this episode I will go over the rationale behind the BYOD Design Considerations Guide and how to use this guide to assist you creating a strategy to embrace BYOD in your company. You can watch this…


Enterprise Mobility and Windows 10

I hope you are playing around with Windows 10 already, there are a lot of new capabilities on this release, but the security and management enhancements are very important not only for the consumer but also for enterprise. The native encryption for files that now you can use upon saving a new file is quiet…


Using Enterprise Mobility Suite Capabilities to Restrict Apps on Windows Phone

One of the most common requests from companies that are embracing BYOD is: how can I restrict apps from running in the user’s mobile device? One of the Enterprise Mobility Suite components that can help you with that is Windows Intune. By using this cloud service you can manage mobile devices from multiple platforms, such…


Enterprise Mobility – Beyond the BYOD Phenomenon

While the “hot topic” nowadays is BYOD, most companies are starting to realize that it is not only about BYOD, it is about enabling a mobile workforce. Companies have different business needs, some will embrace BYOD, some will not since they want to own their mobile devices, and some others will have both: company-owned mobile…