O'Reilly logo

Enterprise Mobility Suite Managing BYOD and Company-Owned Devices by Yuri Diogenes, Jeff Gilbert

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Implementing data protection

In Chapter 7, you learned about data access and protection, including the importance of leveraging built-in capabilities in the Windows operating system to help you protect data and how Azure Rights Management Services (RMS) can be used to provide another level of security for the data.

In this chapter, you take on the role of the senior enterprise administrator for the Blue Yonder Airlines IT department and implement data access and protection as the third phase of their EMS implementation plan as described at the end of Chapter 2. You will be responsible for implementing security controls to mitigate potential data leakage and also ensure that Blue Yonder Airlines’ data is classified according to the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required