Automatic Selective Wipe of Intune App Protection (MAM) Devices on Employee Exit

Bring your own device (BYOD) is the new normal. With organizations sticking to BYOD, securing enterprise data which employees can access is a top concern. Though many organizations are still reluctant to seriously consider BYOD policies, in the coming years the development of such policies will create as big a shift in enterprise computing as PCs did when they first entered the workplace. Though BYOD adds to increased productivity, reduced costs and ease of transition, securing the corporate data by maintaining employee's privacy is a major challenge. When organizations try to secure the devices, many a times they end up tightening it too much that users are skeptical about installing MDM agent on their personal devices; they are concerned that admins can glean personal information and could control how they use their devices. Users fear admins could block camera access, prevent copy and paste, or limit other functionalities. When users do not install MDM agent on (more) »

Why you must Implement Azure ATP or Azure ATA to protect your On-Premise Environment

With the exponential growth in adopting cloud solutions, we all are trying to make Identity and access management as secure as possible. BUT, are you ignoring the security of On-Prem Environment in the urge of cloud Adoption? Azure Advanced Threat Analytics OR Azure Advanced Threat Protection, are the services which you must deploy to prevent security breach for your enterprise. It doesn’t really matter which cloud solution provider you are using for Identity management... as most of them offer scalable and robust solutions. However, losing security focus may damage the backbone of the entire Enterprise (On-Premise Environment). We all know from the best of our experiences and knowledge, attackers will always try to gain access to on-prem directory services, so that they can get a hold of all the resources and they can enter a stage called Domain Dominance. Based on behavioural analytics of typical attackers, all they need is to compromise one single Identity (more) »