Chapter 7. Data access and protection

At this point you have already implemented the identity solution that will be used for your mobile workforce. You also implemented device management giving you control of user-owned devices as well as company-owned devices. While these are critical components of Enterprise Mobility Suite (EMS), there is still one more pillar that must be addressed: data access and protection. Since data is at the center of your solution, and ultimately companies that are embracing mobility want to keep their data secure, it is vital to understand the ramifications of this last pillar before implementing it.

This chapter discusses how to leverage some built-in capabilities available in Windows Server 2012 R2 in combination ...

Get Enterprise Mobility Suite Managing BYOD and Company-Owned Devices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.