Book description
Manage all the mobile devices your workforce relies
on
Learn how to use Microsoft’s breakthrough Enterprise Mobility
Suite to help securely manage all your BYOD and company-owned
mobile devices: Windows, iOS, and Android. Two of the leading
mobile device management experts at Microsoft show you how to
systematically help protect employee privacy and corporate assets
without compromising productivity. You’ll find best
practices, step-by-step guidance, and real-world scenarios for
every stage of planning, design, deployment, and
administration.
Empower your mobile users while improving security and
controlling costs
Master proven best practices for centrally managing smartphones and tablets
Plan mobile strategies that encompass users, devices, apps, and data
Overcome BYOD’s unique challenges, constraints, and compliance issues
Provide common “hybrid” user identities and a seamless experience across all resources: on-premises, datacenter, and cloud
Simplify and improve device enrollment, monitoring, and troubleshooting
Help safeguard both corporate and personal information
Table of contents
- Title Page
- Copyright Page
- Contents at a glance
- Contents
- Foreword
- Introduction
- Chapter 1. Enabling a mobile workforce
- Chapter 2. Introducing the Enterprise Mobility Suite
- Chapter 3. Hybrid identity
- Chapter 4. Implementing hybrid identity
- Chapter 5. Device management
- Chapter 6. Implementing device management
- Chapter 7. Data access and protection
- Chapter 8. Implementing data protection
- Chapter 9. Monitoring BYOD and company-owned devices
- Chapter 10. Troubleshooting Enterprise Mobility Suite
- Index
- Code Snippets
Product information
- Title: Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
- Author(s):
- Release date: April 2015
- Publisher(s): Microsoft Press
- ISBN: 9780735698444
You might also like
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Bring Your Own Device - The mobile computing challenge
The increasing use of personal devices such as smartphones and tablets in the workplace at work …
book
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are …
book
VMware vCloud® Architecture Toolkit (vCAT): Technical and Operational Guidance for Cloud Success
The complete vCAT printed reference: knowledge, tools, and validated designs for building high-value vCloud® solutions The …