Protecting content

As we've progressed through this book, we have demonstrated how critical it is to ensure that we can provide the required security controls to protect the corporate information being provided to the users' devices. The same applies to MCM and EFSS as you deploy these initiatives into your organization. Since we are expanding the user's ability to access content repositories, we need to ensure that we are able to control access to that content as well as data at rest and in transit. When we start looking at content, this could be anything from files, spreadsheets, videos, pictures and so on that will contain all kinds of information about your organization. Allowing any of this information to leave the control of your organization ...

Get Learning AirWatch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.