Preparing Active Directory to support Skype for Business Server 2015.
In this article, I will provide you with an insight into how you can protect the corporate data flowing around on devices using Mobile Applications Management (MAM) policies part of the Microsoft Intune service.
There are many things in life that you might be uncertain about. Will the weather be sunny next month, what will next week’s lottery numbers or will you get stuck in traffic on the commute? Unsurprisingly, moving to the cloud brings a lot of uncertainty for IT administrators not only looking to make the move, but looking to rely on it long term, or those managing complex global infrastructures. So, it comes as little surprise that the kind of product I’m reviewing here helps bring a little bit more certainly to those last two examples, but sadly you’re on your own for the lottery numbers.
You’ve probably heard time and again that more than 63% of network intrusions are due to compromised user credentials. Once on the network, the adversary remains undetected for f months. You’ve spent years building up your perimeter and have a comprehensive protection strategy in place. That said, attackers are still coming through and/or you are worried about insider threats as well.