Protecting Your Data in a People-Centric IT World

In moving from device-centric to people-centric IT, the focus changes slightly from protecting the device to protecting the data. Both are important, but in a BYOD scenario, IT is unable to “lock down” a personal device in the same manner it locked down traditional personal computers in the past. IT must provide flexible user models while protecting corporate resources from unauthorized access. Microsoft’s solutions provide the following:

Image The ability to protect corporate information by selectively wiping apps and data: IT can wipe corporate data and/or render it useless on the device (by revocation ...

Get System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager (SCCM) Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.