Cybersecurity is a complex problem due to constantly changing threats, attacks, regulations, and technology. Microsoft Intune provides unified management of mobile devices and applications to empower productivity while protecting data. Intune uses visibility and controls like conditional access to balance security and user experience across an organization's diverse mobile environment.
Stratégies de croissance via la mobilité (ems)IAMCP Canada
This document summarizes a presentation about Microsoft's Enterprise Mobility Suite (EMS) for enabling digital transformation through cloud services. The presentation discusses how EMS provides identity and access management, information protection, device and application management to secure access to corporate resources from any device. It also describes Advanced Threat Analytics for detecting threats and anomalous activities. Benefits of EMS include improved productivity, security cost avoidance, reduced infrastructure costs, and improved mobile device management.
IBM MaaS360 with Watson offers a new cognitive approach to unified endpoint management that goes beyond traditional mobile device management. It uses cognitive technology like Watson to provide insights, recommendations, and an action plan based on analyzing news, blogs, and the environment. This helps IT and security leaders make faster decisions to evolve their platform and security posture.
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
Businesses face challenges in balancing security needs with enabling access and collaboration. Microsoft's Business Ready Security approach aims to help businesses achieve their goals through an integrated, identity-aware security solution aligned with user needs. It provides protection across devices and environments through solutions for secure messaging, collaboration, endpoints, information protection, and identity/access management in order to maximize return on investment and business enablement. Case studies show customers benefiting through tighter protection, reduced costs and complexity, and saved IT time.
Cognitive unified endpoint management allows organizations to manage devices, identities, applications and content through a single management platform powered by cognitive computing and artificial intelligence. The document discusses how traditional mobile device management solutions were built for simpler times but now IT leaders have bigger ambitions and require solutions that can deliver on user expectations through convenience while also balancing control. It provides an overview of IBM MaaS360's cognitive unified endpoint management platform, how it uses cognitive technology like Watson to provide insights, and the various editions that are available.
The document discusses Windows Intune, a cloud-based PC and mobile device management service from Microsoft. It outlines new Windows Intune licensing options available in early 2013, including bundling Intune with System Center Configuration Manager. It also provides an overview of the top sales scenarios for Intune which are managing unmanaged PCs, mobile device management, and smoother Office 365 deployment. Finally, it encourages partners to prepare for and promote Intune through technical training, marketing tools, and customer demonstrations to take advantage of licensing incentives.
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
This paper explains the MDM strategies and what you have to do to ensure mobile security such as
1. Defining IT policies
2. Asset and Inventory management
3. Configuration management
4. Remote wipe and data encryption
5. VPN
6. Password policies
7. Tunnel gateway
8. Jail break detection
9. Malware protection
This document provides an overview of enterprise mobility and mobile security, with a focus on the Android platform. It discusses best practices for secure software development and the Android security architecture. The document outlines Android's permission-based security model and sandboxing approach. It also examines Android's attack surfaces and how enterprises can leverage features in newer Android versions like remote wiping, encryption, and device administration policies. The presentation concludes with an invitation for questions.
Stratégies de croissance via la mobilité (ems)IAMCP Canada
This document summarizes a presentation about Microsoft's Enterprise Mobility Suite (EMS) for enabling digital transformation through cloud services. The presentation discusses how EMS provides identity and access management, information protection, device and application management to secure access to corporate resources from any device. It also describes Advanced Threat Analytics for detecting threats and anomalous activities. Benefits of EMS include improved productivity, security cost avoidance, reduced infrastructure costs, and improved mobile device management.
IBM MaaS360 with Watson offers a new cognitive approach to unified endpoint management that goes beyond traditional mobile device management. It uses cognitive technology like Watson to provide insights, recommendations, and an action plan based on analyzing news, blogs, and the environment. This helps IT and security leaders make faster decisions to evolve their platform and security posture.
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
Businesses face challenges in balancing security needs with enabling access and collaboration. Microsoft's Business Ready Security approach aims to help businesses achieve their goals through an integrated, identity-aware security solution aligned with user needs. It provides protection across devices and environments through solutions for secure messaging, collaboration, endpoints, information protection, and identity/access management in order to maximize return on investment and business enablement. Case studies show customers benefiting through tighter protection, reduced costs and complexity, and saved IT time.
Cognitive unified endpoint management allows organizations to manage devices, identities, applications and content through a single management platform powered by cognitive computing and artificial intelligence. The document discusses how traditional mobile device management solutions were built for simpler times but now IT leaders have bigger ambitions and require solutions that can deliver on user expectations through convenience while also balancing control. It provides an overview of IBM MaaS360's cognitive unified endpoint management platform, how it uses cognitive technology like Watson to provide insights, and the various editions that are available.
The document discusses Windows Intune, a cloud-based PC and mobile device management service from Microsoft. It outlines new Windows Intune licensing options available in early 2013, including bundling Intune with System Center Configuration Manager. It also provides an overview of the top sales scenarios for Intune which are managing unmanaged PCs, mobile device management, and smoother Office 365 deployment. Finally, it encourages partners to prepare for and promote Intune through technical training, marketing tools, and customer demonstrations to take advantage of licensing incentives.
Mobile Device Management and Mobile Security Strategy - a presentation by Rap...RapidValue
This paper explains the MDM strategies and what you have to do to ensure mobile security such as
1. Defining IT policies
2. Asset and Inventory management
3. Configuration management
4. Remote wipe and data encryption
5. VPN
6. Password policies
7. Tunnel gateway
8. Jail break detection
9. Malware protection
This document provides an overview of enterprise mobility and mobile security, with a focus on the Android platform. It discusses best practices for secure software development and the Android security architecture. The document outlines Android's permission-based security model and sandboxing approach. It also examines Android's attack surfaces and how enterprises can leverage features in newer Android versions like remote wiping, encryption, and device administration policies. The presentation concludes with an invitation for questions.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
IBM Security QRadar SIEM
IBM Security QRadar SIEM is a next-generation SIEM platform that collects security data from across hybrid IT environments, analyzes it using advanced analytics and machine learning, and helps security teams detect, prioritize and respond to cyber threats.
This document discusses mobile device management capabilities in Intune across different platforms like Windows, iOS, and Android. It provides details on settings that can be managed for iOS devices, software distribution methods for different platforms, and how policies can be applied to enroll devices and grant email access conditionally. The document also contains relevant learning resources and contact details.
This document discusses mobile device management (MDM) software and the Airwatch MDM solution. It provides an overview of MDM and its purpose to securely manage and support mobile devices. It then describes different implementation architectures for Airwatch, including cloud-based options with no on-premise infrastructure or a lightweight integration component, and on-premise options with a single server or multiple servers. The document concludes that MDM optimizes functionality, security and costs for mobile networks while managing risks of mobile access.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
The security immune system document discusses an integrated approach to cybersecurity using the metaphor of the human immune system. It describes how the IBM security immune system works in an integrated manner across security planning, operations, and information protection. The summary provides an overview of the key areas covered in the document:
1) The IBM security immune system takes an integrated approach similar to the human immune system, allowing security components to work together across planning, response, and protection.
2) It covers security transformation services, security operations and response, and information risk and protection.
3) The goal is to provide intelligence, visibility and insights across the entire security system to prevent, detect and respond to threats.
This document summarizes Trend Micro's small business security solution. It outlines common small business security pain points such as limited budgets and mobile device management. It then describes how Trend Micro addresses these issues through offerings like Worry-Free Business Security, which provides endpoint protection, email security, and mobile device management through a centralized web-based console. The document also highlights new features in Worry-Free Business Security 9.0 like mobile device security for Exchange ActiveSync users and improved Mac support. Resources for the product are provided at the end.
The document discusses mobile device management (MDM) and provides an overview of MDM approaches, technologies, benefits, and use cases. It describes how MDM can securely manage mobile devices through features like remote configuration, software distribution, security policies, troubleshooting, and data protection. Common MDM platforms discussed include HP Enterprise Mobility Suite, Microsoft System Center Mobile Device Manager, and Afaria.
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
This document discusses new legal requirements for mobile security in California. It summarizes data from the California Attorney General showing a rise in data breaches affecting millions of California residents. The document recommends that enterprises implement an Enterprise Mobility Management (EMM) system to meet requirements of California law by securely managing mobile devices and applications. It outlines how EMM can help satisfy several of the 20 Critical Security Controls and argues that EMM has become necessary for legal compliance, as shown by a $650,000 HIPAA settlement resulting from a failure to manage mobile devices. Resources on MobileIron's website are provided.
Mobile device management (MDM) is one of the most essential and widely-used technologies in 2021 – but that doesn’t mean everyone understands it. People may use the term mobile device management meaning something else, or not understand what they need for their ideal mobile device management system. While it is easy to find mobile device management solutions, it can be hard to choose which mobile device management free trials to try.
You’ll find the answers to many common questions here, as well as clear steps for implementing mobile device management in your business.
Windows Intune provides administrators tools to manage devices enrolled in the service. It includes dashboards to view usage statistics, device details, critical update status, and mobile device management. Administrators can check health, update status, security details for each device. Windows Intune aims to simplify management of updates and policies across all device types. It uses alerts and role-based access to efficiently address issues.
Vojtěch Morávek, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
On October 26th, C/D/H presented on Windows Intune to a group of IT professionals at TechKNOWLEDGEy 2011. Attendees learned an overview of Intune and how it can simply PC management.
View the slide deck and find out the benefits of Intune, if it’s right for your business, pricing basics and how to take advantage of a free trial.
For more information on this or other topics, visit our blog at www.cdhtalkstech.com.
Symantec Enterprise Mobility Vision May 2012Symantec
Symantec is enhancing its enterprise mobility portfolio with new features: 1) mobile application management, 2) code signing for Android apps, 3) data loss prevention for mobile devices, and 4) a certificate intelligence center for mobile. These new features will help businesses better manage mobile devices, secure Android apps, protect corporate data on mobile devices, and manage SSL certificates on their networks. The enhanced products will be available starting in May and sold through Symantec's channels globally.
The document discusses business and IT security challenges and how Microsoft's business ready security solutions can help address them. It outlines the need for integrated, simplified and comprehensive security across devices and cloud environments to protect against evolving threats. The solutions discussed include identity and access management, encryption, antivirus, information protection and device management to provide protection everywhere and simplify security management.
Be prepared to face any business challenge with a highly secured remote workforce that comes with Intune deployment and Microsoft PKI integration. Also, stay ahead of the curve by transitioning towards a passwordless future, maximizing security while eliminating the need for passwords.
This is the product and services portfolio of IBM Security, which is one pillar of IBM CAMSS strategy. Products in portfolio are still moving during early 2015 due to re-portfolio of IBM. However, it will be categorized in 2 major parts.
1) IBM Security Products : all security software and appliance
2) IBM Security Services : all security services, including Cloud security.
IBM Security QRadar SIEM
IBM Security QRadar SIEM is a next-generation SIEM platform that collects security data from across hybrid IT environments, analyzes it using advanced analytics and machine learning, and helps security teams detect, prioritize and respond to cyber threats.
This document discusses mobile device management capabilities in Intune across different platforms like Windows, iOS, and Android. It provides details on settings that can be managed for iOS devices, software distribution methods for different platforms, and how policies can be applied to enroll devices and grant email access conditionally. The document also contains relevant learning resources and contact details.
This document discusses mobile device management (MDM) software and the Airwatch MDM solution. It provides an overview of MDM and its purpose to securely manage and support mobile devices. It then describes different implementation architectures for Airwatch, including cloud-based options with no on-premise infrastructure or a lightweight integration component, and on-premise options with a single server or multiple servers. The document concludes that MDM optimizes functionality, security and costs for mobile networks while managing risks of mobile access.
The IBM Security Client References Guide includes summary slides of IBM clients across various industries that have successfully implemented solutions from the IBM Security Portfolio.
The security immune system document discusses an integrated approach to cybersecurity using the metaphor of the human immune system. It describes how the IBM security immune system works in an integrated manner across security planning, operations, and information protection. The summary provides an overview of the key areas covered in the document:
1) The IBM security immune system takes an integrated approach similar to the human immune system, allowing security components to work together across planning, response, and protection.
2) It covers security transformation services, security operations and response, and information risk and protection.
3) The goal is to provide intelligence, visibility and insights across the entire security system to prevent, detect and respond to threats.
This document summarizes Trend Micro's small business security solution. It outlines common small business security pain points such as limited budgets and mobile device management. It then describes how Trend Micro addresses these issues through offerings like Worry-Free Business Security, which provides endpoint protection, email security, and mobile device management through a centralized web-based console. The document also highlights new features in Worry-Free Business Security 9.0 like mobile device security for Exchange ActiveSync users and improved Mac support. Resources for the product are provided at the end.
The document discusses mobile device management (MDM) and provides an overview of MDM approaches, technologies, benefits, and use cases. It describes how MDM can securely manage mobile devices through features like remote configuration, software distribution, security policies, troubleshooting, and data protection. Common MDM platforms discussed include HP Enterprise Mobility Suite, Microsoft System Center Mobile Device Manager, and Afaria.
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
This document discusses new legal requirements for mobile security in California. It summarizes data from the California Attorney General showing a rise in data breaches affecting millions of California residents. The document recommends that enterprises implement an Enterprise Mobility Management (EMM) system to meet requirements of California law by securely managing mobile devices and applications. It outlines how EMM can help satisfy several of the 20 Critical Security Controls and argues that EMM has become necessary for legal compliance, as shown by a $650,000 HIPAA settlement resulting from a failure to manage mobile devices. Resources on MobileIron's website are provided.
Mobile device management (MDM) is one of the most essential and widely-used technologies in 2021 – but that doesn’t mean everyone understands it. People may use the term mobile device management meaning something else, or not understand what they need for their ideal mobile device management system. While it is easy to find mobile device management solutions, it can be hard to choose which mobile device management free trials to try.
You’ll find the answers to many common questions here, as well as clear steps for implementing mobile device management in your business.
Windows Intune provides administrators tools to manage devices enrolled in the service. It includes dashboards to view usage statistics, device details, critical update status, and mobile device management. Administrators can check health, update status, security details for each device. Windows Intune aims to simplify management of updates and policies across all device types. It uses alerts and role-based access to efficiently address issues.
Vojtěch Morávek, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
On October 26th, C/D/H presented on Windows Intune to a group of IT professionals at TechKNOWLEDGEy 2011. Attendees learned an overview of Intune and how it can simply PC management.
View the slide deck and find out the benefits of Intune, if it’s right for your business, pricing basics and how to take advantage of a free trial.
For more information on this or other topics, visit our blog at www.cdhtalkstech.com.
Symantec Enterprise Mobility Vision May 2012Symantec
Symantec is enhancing its enterprise mobility portfolio with new features: 1) mobile application management, 2) code signing for Android apps, 3) data loss prevention for mobile devices, and 4) a certificate intelligence center for mobile. These new features will help businesses better manage mobile devices, secure Android apps, protect corporate data on mobile devices, and manage SSL certificates on their networks. The enhanced products will be available starting in May and sold through Symantec's channels globally.
The document discusses business and IT security challenges and how Microsoft's business ready security solutions can help address them. It outlines the need for integrated, simplified and comprehensive security across devices and cloud environments to protect against evolving threats. The solutions discussed include identity and access management, encryption, antivirus, information protection and device management to provide protection everywhere and simplify security management.
Be prepared to face any business challenge with a highly secured remote workforce that comes with Intune deployment and Microsoft PKI integration. Also, stay ahead of the curve by transitioning towards a passwordless future, maximizing security while eliminating the need for passwords.
‘In Zero Trust we Trust’, is how one would describe the biggest security transformation that has occurred in the past 6 months. With the unprecedented rise in remote workforces, and the accompanying security and operational challenges it has brought about, the mantra for a secure business model in 2020 has revolved around implementing a Zero Trust Model. Read More: https://instasafe.com/docs/Datasheet%20-%20Zero%20Trust%20Access%20-%20Final%20V2.pdf
The document discusses Microsoft's Enterprise Mobility + Security (EMS) solution. EMS provides identity-driven security, managed mobile productivity, and a comprehensive solution to address challenges of mobility and cloud adoption. It secures access across devices, apps and user identities on-premises and in the cloud with integrated solutions like Azure Active Directory, Microsoft Intune and Advanced Threat Analytics.
Microsoft Intune y Gestión de Identidad Corporativa Plain Concepts
Gestiona todos tus dispositivos corporativos Windows 10 desde Microsoft Intune. Entornos híbridos de autenticación, autenticación multi factor y acceso seguro a aplicaciones SaaS. Por Jose María Genzor
19.10.2016 klo 9.30 järjestimme webinaarin, jossa kävimme teknisen tietoturvan keskeiset osa-alueet lävitse ja kerromme, mitkä ovat kunkin osa-alueen asiat, jotka vähintään pitää olla kunnossa, jotta voi yöllä nukkua rauhallisin mielin. Asiantuntijavieraana webinaarissa on Microsoftin Partner Technology Strategist, Ari Auvinen, joka osaltaan kertoi, millaisia teknisiä ratkaisuja tietoturva-asioiden kunnostamiseen on olemassa.
Microsoft Intune - Global Azure Bootcamp 2018JoTechies
Define a mobile management strategy that fits the needs of your organization. Apply flexible mobile device and app management controls that let employees work with the devices and apps they choose while protecting your company information.
WithSecure Elements Endpoint Protection is a unified endpoint security solution that protects Windows, Mac, and mobile devices from cyber threats. It offers advanced anti-malware, behavioral analysis, patch management, and a cloud-based management portal to deploy, monitor, and update protection across all devices from a single console. Independent tests have found WithSecure to provide superior protection compared to competitors, winning the 'Best Protection' award from AV-Test multiple years in a row.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
The document provides an overview of IBM MobileFirst services for developing, implementing, and managing mobile solutions. It discusses IBM's mobile consulting, development, integration, strategy, and managed services offerings. These services help clients address challenges in building mobile enterprise strategies, developing mobile applications, integrating mobile with backend systems, and managing mobile devices and infrastructure. The document also highlights IBM's mobile expertise across industries and partnerships.
Manage and deploy apps to devices to make sure users have access to the tools they need for their jobs. In contrast to Intune, which delivers unified endpoint management and device security across numerous platforms, Microsoft Defender for Identity concentrates on sophisticated threat detection and protection within on-premises Active Directory systems.
Visit: https://techsolworld.com/
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
The document discusses implementing a Zero Trust security model using Microsoft 365 services. It provides 12 key tasks for security teams to quickly implement important capabilities for remote work, including enabling multi-factor authentication, configuring threat protection in Office 365 and Azure, implementing mobile device management with Intune, and training users. It also maps the tasks to Microsoft 365 licensing plans to help organizations determine which capabilities they can access.
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
Enterprise Mobility Suite (EMS) provides identity management, mobile device management, and information protection capabilities through Azure Active Directory Premium, Microsoft Intune, and Azure Rights Management. EMS addresses challenges around mobile device and app management, identity and access management, and information protection. It offers a single SKU to license these Microsoft products together at a discounted rate compared to individual purchases. The presentation highlights the key components and benefits of EMS.
The document discusses enterprise mobility and security solutions from Microsoft. It addresses challenges of managing user identities, devices, applications and data across cloud and on-premises environments. The key solutions discussed are identity-driven security to protect access to resources, managed mobile productivity to encourage secure mobile work habits, and a comprehensive solution that integrates capabilities to offer advanced security while saving costs.
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
With an increasingly mobile workforce, and the spread of shadow IT, the rapid rise of cybercrime - companies must find unique ways to effectively manage their sprawling SaaS portfolio.
Seqrite HawkkEye is a centralized security management (CSM) that strengthens your organization’s security posture. Get more info about this cloud security platform, unified endpoint management, and more make insight-driven security decisions in real-time.
https://www.seqrite.com/documents/en/datasheets/seqrite-hawkkeye-datasheet.pdf
Global Azure Bootcamp 2018 completed recently across the world with a huge success, and I had the opportunity to co-organize the event in Chennai, India. Also delivered a session under the IT Pro track on "Securing Your Organization with Microsoft 365. Uploaded the Session Slides here.
Event url: http://chennai-gab2018.azurewebsites.net/
Webinar: Securing Remote Workforce on the Microsoft CloudWithum
With remote work being a reality for most, users expect to be able to connect to any resource, on any device, from anywhere in the world. Let’s face it – there is a growing realization that remote work is here to stay, so let’s do it right.
There are three critical areas that should be top of mind:
- How can we do remote work better?
- How can we maintain security?
- And, how can we reduce costs?
In this presentation, we share ideas and show tools in the Microsoft cloud for better remote work, better security and opportunity to reduce costs.
Similar to Atea erfa microsoft mobile security (20)
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
6. What makes cybersecurity a complex problem?
100101
011010
100011
MalwareSpam Smart attackers Intelligent attacks
Volume of attacks Sophistication of attacks
7. What type of attack to launch…
Who to target in attacks…
When to launch an attack…
Hackers How often to attack…
What type of attacks are happening…
Who is attacking them…
When attackers strike…
Analysts
How often do attacks occur…
A hacker’s advantage is preparation & knowledge
19. EXPERIENCE
• 1M+ Corporate Machines
protected by enterprise IT security
• Multi-platform
Cloud-first hybrid enterprise
• Decades of experience
as a global enterprise
• Runs on Azure
same multi-tenant Azure
environment as you
EXPERTISE
• Development Security
Security Development Lifecycle
(SDL) - ISO/IEC 27034-1
• Operational Security
Hyper-scale cloud services
• Combatting Cybercrime
partnering with law enforcement
• Incident Investigation
and recovery for customers
Visibility
ExpertiseExperience
Context
Industry leading capabilities
VISIBILITY & CONTEXT
1 billion customers
across enterprise and
consumer segments
200+ cloud services
21. Balancing productivity with protection.
How do IT Pros empower their users to be
productive, while protecting the massive
amounts of data flowing through their
mobile ecosystem?
23. Mobile application
management
PC managementMobile device
management
Strategically direct the flow of your mobile ecosystem, giving your end
users the experience they expect while ensuring your corporate data is
protected at every turn.
Enterprise mobility management with Intune
Enable
your users
Protect
your data
Microsoft Intune
User IT
25. Click to edit Master title
style
Delivering on a unified
Microsoft vision
Built with EMS, Office and
Windows, Intune delivers on a
unified Microsoft vision to
transform the way enterprise
secures mobile productivity.
This combined effort enables
awesome end-to-end scenarios.
Control access to your data
Control what happens to your data
after it’s been accessed
Modern PC management
26. Click to edit Master title
style
Control access to data
based on real-time context
Conditional access allows you to
define policies that provide
contextual controls at the user,
location, device, and app levels.
As conditions change, natural user
prompts ensure that only the right
users on compliant devices can
access sensitive data.
27. Azure Active Directory
Premium
Microsoft Intune
Microsoft Intelligent
Security Graph
Risk-based conditional access
• Block access
• Wipe device
Conditions
• Allow
• Enforce MFA
• Remediate
Actions
Location (IP range)
Device state
User groupUser
MFA
Risk
On-premises
applications
Microsoft Azure
Risk (Low, Medium, High)
28. Click to edit Master title
style Managed apps
Personal appsPersonal apps
Managed apps
MDM – optional
(Intune or 3rd-party)
Our app protection policies allow you
to control what happens to docs and
data after they’ve been accessed.
• App encryption at rest
• App access control – PIN or credentials
• Save as/copy/paste restrictions
• App-level selective wipe
• Managed web browsing
• Secure viewing of PDFs, images, videos
Control what happens
after the data is accessed
Corporate
data
Personal
data
Multi-identity policy
29. Click to edit Master title
style
With the different options in
Windows 10, plus Configuration
Manager and Intune, you have the
flexibility to stage implementation
of modern management scenarios
while targeting different devices
the way that best suits your
business needs.
Everything you need for
modern PC management
31. Click to edit Master title
styleAn awesome end-user
and IT Pro experience
Natural and intuitive, the best
experience for both end users
and IT Pros. The control and
support IT requires; the
experience your people
expect.
Real Office apps
Protect data with and without device
enrollment
Intune on Azure
Support to get you started and
keep you going day-to-day
32. Click to edit Master title
style
The Office apps end-users
expect
Give your people the real Office
experience they expect, without
compromising the control you
need. Intune gives you
unparalleled control over the data
in that moves through Office -
across all your devices.
33. Click to edit Master title
style
Protect with and without
enrollment
Intune’s application protection
policies give you the versatility to
manage your data with or without
device enrollment.
34. Click to edit Master title
styleWorld class support –
included
FastTrack provides you access to a
team of engineers dedicated to
helping you plan and execute your
deployment. And our 24/7
support ensures you have the
support you need day to day.
Both included with your Intune subscription.
36. Click to edit Master title
styleMeets your immediate
needs and adapts to your
evolving IT strategy.
Microsoft Intune is built from
the cloud, with the flexibility
and control that meets your
needs today, and scales as
your mobile strategy matures
and evolves over time.
Microsoft Cloud Infrastructure
Inclusive partner ecosystem
Flexibility and choice in how you manage
your mobile ecosystem
37. Click to edit Master title
style
You need flexibility in a
complex device ecosystem
Microsoft Intune provides you
option that allow you to keep your
data secure across a range of
scenarios that occur day-to-day.
Our MAM and MDM capabilities
allow you to protect corporate data
with or without device
management.
Company-Managed
Employee-Managed
3rd Party-Managed
39. Click to edit Master title
style
The best control with
Intune-enlightened apps
All Intune-enlightened applications
are built with the Intune App SDK,
enabling them with the richest set
of mobile application protection
policies available.
Many also support multi-identity
and without enrollment scenarios.
40. Click to edit Master title
style
Also manage apps via
native OS app controls
Intune can also manage apps via
native app controls that are
exposed through iOS and Android
operating systems. This capability
extends Intune’s app ecosystem
beyond our SDK built enlightened
apps, to include many other
popular business apps.
Only for managed devices.
41. Click to edit Master title
style
A growing partner
ecosystem
Intune partnerships are designed to
enhance our core functionality by
delivering interoperability with
popular point solutions our
customers want and rely upon.
All partner products must be purchased directly from the partner
42. Device is compliant
Device is managed
Scans apps for risk
ITScans unknown
network for risk
Allow access or
Block access
Enforce MFA per
user/per app
Device compliant
Scans OS for vulnerability
Risk (Low, Medium, High)
43. X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
Cisco ISE enforcement
VPN
WiFi
44. X X X X X
✓ Require enrollment through the Intune portal to ensure compliance
Intune conditions
Device managed
Device compliant
✓ Enforce appropriate network access policies based on mobile device posture and risk assessment.
Allow access
Block access
NetScaler enforcement
VPN
45. Click to edit Master title
style
Delivered from the cloud
Because Microsoft Intune is cloud-
based, it lowers costs and
eliminates the need to plan,
purchase, and maintain on premise
hardware and infrastructure.
Intune is always up to date, and
scales with ease as your needs
evolve.
52. HIPAA /
HITECH Act
FERPA
GxP
21 CFR Part 11
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC Japan
New Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
CDSA
Shared
Assessments
Japan My
Number Act
FACT UK GLBA
Spain
ENS
PCI DSS
Level 1 MARS-E FFIEC
China
TRUCS
Canada
Privacy Laws
MPAA
Privacy
Shield
India
MeitY
Germany IT
Grundschutz
workbook
Spain
DPA
HITRUST IG Toolkit UK
China
DJCP
ITAR
Section 508
VPAT
SP 800-171 FIPS 140-2
High
JAB P-ATO
CJIS
DoD DISA
SRG Level 2
DoD DISA
SRG Level 4
IRS 1075
DoD DISA
SRG Level 5
Moderate
JAB P-ATO
GLOBALUSGOVINDUSTRYREGIONAL
ISO 27001
SOC 1
Type 2ISO 27018
CSA STAR
Self-AssessmentISO 27017
SOC 2
Type 2
SOC 3ISO 22301
CSA STAR
Certification
CSA STAR
AttestationISO 9001
Azure has the deepest and most comprehensive compliance coverage in the industry
March
2017