Book description
Enable employees to be productive and access data from any
location or device
Protect both corporate assets and employee privacy, so your people
can be fully productive from any device, anywhere. Learn how to use
Microsoft Intune to manage applications to satisfy your unique
requirements, make the most of Mobile Device Management (MDM) for
Office 365, and defend on-premises resources with Microsoft
Advanced Threat Analytics (ATA).
Plan, deploy, and deliver complete enterprise mobility while
improving security
Choose the right Microsoft enterprise mobility solution for your organization
Protect apps and data with Microsoft Intune Mobile Application Management (MAM)
Identify suspicious user or device activity in hybrid cloud/on-premises environments
Prepare for and successfully implement Microsoft ATA
Flexibly manage diverse mobile devices with MDM for Office 365
Configure access, define policies, enroll mobile devices, and manage compliance
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents at a glance
- Contents
- Foreword
- Introduction
- Chapter 1. Understanding Microsoft enterprise mobility solutions
- Chapter 2. Introducing mobile application management with Intune
- Chapter 3. Implementing mobile application management
- Chapter 4. Introducing Microsoft Advanced Threat Analytics
- Chapter 5. Implementing Microsoft Advanced Threat Analytics
- Chapter 6. Introducing Mobile Device Management for Office 365
- Chapter 7. Implementing Mobile Device Management for Office 365
- Appendix: Troubleshooting Microsoft Advanced Threat Analytics
- Index
- About the authors
- Free ebooks
- Microsoft Press Guided Tours
- Hear about it first
- Visit us today
- Survey
- Code Snippets
Product information
- Title: Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD
- Author(s):
- Release date: February 2016
- Publisher(s): Microsoft Press
- ISBN: 9781509301362
You might also like
book
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you …
book
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book …
book
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise …
book
Protecting Data Privacy Beyond the Trusted System of Record
To help you safeguard your sensitive data and provide ease of auditability and control, IBM introduced …