From IT Pro to Cloud Pro: Microsoft Office 365 and SharePoint Online (SHARLA SORGE's Library) by Ben Curry & Brian Laws

From IT Pro to Cloud Pro: Microsoft Office 365 and SharePoint Online (SHARLA SORGE's Library) by Ben Curry & Brian Laws

Author:Ben Curry & Brian Laws
Language: eng
Format: epub
Publisher: Microsoft Press
Published: 2016-07-12T16:00:00+00:00

Nowadays, there’s the expectation that users should be able to get their work done at any time, from anywhere, and from nearly any device. This work can include email, working on documents, collaborating with coworkers, viewing one’s calendar, and so on. The work device can be a mobile device like a phone or a tablet, a company-provided laptop, a PC at home, or an employee-owned laptop as part of a Bring Your Own Device (BYOD) policy. The company’s data is not necessarily contained strictly within its walls anymore. It’s actually quite possible that a lot of company data is distributed across devices in people’s pockets.

This reality poses a real security challenge for companies. What happens if that device is lost or stolen? Is there data on that device that can be accessed by someone else (maybe even someone with harmful intent)? How well protected is that device? If someone turns it on, can that person get direct access to the company systems? These questions might be answerable if the company managed the devices, but that’s rare nowadays. Most office workers use personal devices that might or might not have been “on-boarded.” This can be quite frightening to most organizations, but many feel like there’s not much they can do about it. Quite often, the risk is simply part of the cost of doing business these days.

However, companies can do something to protect themselves and their data: deploy a mobile device management system. An MDM system provides tools companies can use to control who and what has access to data from mobile devices. It enables them to ensure some baseline of protection for both on-boarded (company-managed) and non-on-boarded (personal) devices. This policy usually includes enforcing things like using a PIN, requiring encryption, or deploying a secured browser. Organizations also can provide a way to remotely wipe the device (or a part of the device) if it’s stolen or otherwise compromised. An MDM system can be the next-best thing to a company directly managing a mobile device, and such a system is highly recommended for a distributed workforce that needs to bring sensitive company data down to their devices.


Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Hello! Python by Anthony Briggs(2196)
Hadoop in Practice by Alex Holmes(826)
Learn Windows PowerShell in a Month of Lunches by Don Jones(550)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(448)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(391)
The Old New Thing by Raymond Chen(296)
Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity(274)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(266)
Computers For Seniors For Dummies by Nancy C. Muir(248)
Linux Phrasebook (Developer's Library) by Granneman Scott(244)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(238)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(232)
The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version by Martin Brinkmann(221)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(214)
Java Cookbook by Ian F. Darwin(181)
Continuous Delivery with Docker and Jenkins by Leszko Rafal(180)
| by admin(177)
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman(176)
Bash Cookbook: Solutions and Examples for Bash Users by Carl Albing & Jp Vossen(175)
Docker on Windows by Stoneman Elton(170)
Web Analytics