9780735698406

Enterprise Mobility Suite Managing BYOD and Company-Owned Devices

by ;
  • ISBN13:

    9780735698406

  • ISBN10:

    0735698406

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2015-04-01
  • Publisher: Microsoft Press
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $24.99 Save up to $3.75
  • Buy New
    $21.24

    USUALLY SHIPS IN 3-5 BUSINESS DAYS

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Manage all the mobile devices your workforce relies on
Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration.

Empower your mobile users while improving security and controlling costs
  • Master proven best practices for centrally managing smartphones and tablets
  • Plan mobile strategies that encompass users, devices, apps, and data
  • Overcome BYOD’s unique challenges, constraints, and compliance issues
  • Provide common “hybrid” user identities and a seamless experience across all resources: on-premises, datacenter, and cloud
  • Simplify and improve device enrollment, monitoring, and troubleshooting
  • Help safeguard both corporate and personal information

Author Biography

Yuri Diogenes is a Senior Content Developer on Microsoft’s CSI Enterprise Mobility Team and has more than 20 years of experience in the IT field. He holds a Master of Science degree in Cybersecurity Intelligence and Forensics Investigation (Utica College) and has been working for Microsoft for the past nine years, including five years as a Senior Support Escalation Engineer on the CSS Forefront Edge Team. Yuri also holds an MBA and several industry certifications, including MCSE, MCTS, CISSP, ECEH, ECSA, Security+, Cloud Essentials Certified, Mobility+, Network+, Cloud+, and CASP. You can follow Yuri on Twitter @yuridiogenes or read his articles on his personal blog at http://aka.ms/yuridio.

Jeff Gilbert is a Senior Solutions Content Developer for the Cloud & Enterprise Division at Microsoft. From his office outside Boston, he authors cross-product solutions to IT business problems involving enterprise client management technologies, including Microsoft System Center Configuration Manager, Microsoft Intune, and Microsoft Desktop Optimization Pack (MDOP) products. In addition to local user groups, Jeff has been a speaker on enterprise client management and MDOP technologies at several conferences over the years, including the Microsoft Management Summit (MMS) and TechEd. Previous to this role, Jeff was the content publishing manager for MDOP and a senior technical writing lead for the Configuration Manager 2007 documentation team. Before joining Microsoft, Jeff was an SMS 2.0/SMS 2003 administrator with the US Army. You can follow Jeff on Twitter @jeffgilb.

Table of Contents

1. Enabling a Mobile Workforce
2. Introducing the Enterprise Mobility Suite
3. Hybrid Identity
4. Implementing Hybrid Identity - A Scenario Based Approach
5. Device Management
6. Implementing Device Management - A Scenario Based Approach
7. Data Access and Protection
8. Implementing Data Access and Protection - A Scenario Based Approach
9. Monitoring BYOD and Company Owned Devices
10. Troubleshooting BYOD and Company Owned Devices

Rewards Program

Write a Review