Book description
Manage all the mobile devices your workforce relies
on
Learn how to use Microsoft’s breakthrough Enterprise Mobility
Suite to help securely manage all your BYOD and company-owned
mobile devices: Windows, iOS, and Android. Two of the leading
mobile device management experts at Microsoft show you how to
systematically help protect employee privacy and corporate assets
without compromising productivity. You’ll find best
practices, step-by-step guidance, and real-world scenarios for
every stage of planning, design, deployment, and
administration.
Empower your mobile users while improving security and
controlling costs
Master proven best practices for centrally managing smartphones and tablets
Plan mobile strategies that encompass users, devices, apps, and data
Overcome BYOD’s unique challenges, constraints, and compliance issues
Provide common “hybrid” user identities and a seamless experience across all resources: on-premises, datacenter, and cloud
Simplify and improve device enrollment, monitoring, and troubleshooting
Help safeguard both corporate and personal information
Table of contents
- Title Page
- Copyright Page
- Contents at a glance
- Contents
- Foreword
- Introduction
- Chapter 1. Enabling a mobile workforce
- Chapter 2. Introducing the Enterprise Mobility Suite
- Chapter 3. Hybrid identity
- Chapter 4. Implementing hybrid identity
- Chapter 5. Device management
- Chapter 6. Implementing device management
- Chapter 7. Data access and protection
- Chapter 8. Implementing data protection
- Chapter 9. Monitoring BYOD and company-owned devices
- Chapter 10. Troubleshooting Enterprise Mobility Suite
- Index
- Code Snippets
Product information
- Title: Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
- Author(s):
- Release date: April 2015
- Publisher(s): Microsoft Press
- ISBN: 9780735698444
You might also like
book
Networking Fundamentals
Become well-versed with basic networking concepts such as routing, switching, and subnetting, and prepare for the …
book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Solutions Architect's Handbook
From fundamentals and design patterns to the different strategies for creating secure and reliable architectures in …