As more work is done on mobile devices that could fall into anyone’s hands, sensitive corporate data and documents must be appropriately protected. Companies must be diligent about securing devices, applications and content as users move from office to home, to airport to mall, to coffee shop and back again.
Vendors offer a plethora of tools for mobile device management, mobile application management and mobile content management — and one size does not fit all. If your security architecture doesn’t have all the capabilities needed to mitigate exposure, you can spend a lot of money and still suffer a breach. On the other hand, if you implement a security architecture that’s more sophisticated and complex than necessary, IT staff could get bogged down.
Securing the Mobile Office 365 Workspace
Organizations adopting Microsoft Office 365 may find Microsoft Intune especially interesting.
Companies that use Microsoft Office 365 as their main personal productivity platform share a lot of information in document formats such as Excel and Word. Applying the right policies to those documents can mitigate exposure of sensitive information.
Microsoft Intune does that exceptionally well. Administrators can use Intune to set all kinds of user rights policies at the document level. These policies let you control who can open or edit specific documents, as well as whether users can copy documents onto another device such as a USB drive. You can also set expiration dates on documents so you don’t have to worry about information being used inappropriately down the road.
These policies can even be applied to documents being used outside your organization — an important feature given that few of today’s businesses are fully self-contained. With Microsoft Intune, a company can include its contractors and partners in workflows while still maintaining a high degree of mobile content security.
A Little or a Lot
Microsoft’s approach to mobile security enables IT departments to calibrate their mobile security architecture and mobile security costs to their needs. Some features come free with Office 365, while a basic Intune deployment costs only a few dollars per month and is licensed per user rather than per device. You can take another step up if you want to use Microsoft Active Directory Premium for cloud-based authentication to secure additional mobile applications and gain features such as self-service password reset. Or, you can go the whole nine yards and adopt the full Microsoft Enterprise Mobility Suite for true security best-practices across all devices, applications and content.
This spectrum of choice is not only helpful for matching mobile security architecture to mobile needs, but affords the flexibility of adapting your mobile security to your organization’s use of mobility as it evolves over time, as it almost certainly will.
If you haven’t taken a look at Microsoft Intune yet, I encourage you to do so. Download this white paper for more information or take a look at CDW’s collection of Microsoft mobility-related content. Lastly, check out these BizTech Magazine articles for even more insight into how companies just like yours are taking advantage of Intune.
And if you need some help figuring out whether it’s the best match for your needs, send me an email or give your CDW rep a call.