Information Protection: Microsoft Enterprise Mobility Suite (Part 2)

Do you know how many cloud applications are being accessed by your employees?
Are your employees sharing valuable information via emails and attachments?
Is Your Help Desk Inundated with Password Reset Requests Over and Over?
Get Started With A FREE Trial Get Started With A FREE Trial Request a Consultation Request a Consultation Download FREE MOBILE DEVICE SECURITY REPORT

Information Protection: Microsoft Enterprise Mobility Suite (Part 2) on

Who’s really accessing your company’s most valuable data?


It’s a BYOD party at many enterprises today, and that’s causing serious security issues. Employees will not be parted with their personal mobile devices. They expect to use them as productivity tools at the office.


Microsoft Enterprise Mobility Suite (EMS) gives you the power to retain this productivity for employees. It protects sensitive data with a rights management service that works with your existing on-premises infrastructure. Security has to extend much further. What about the information your employees access from remote sources? You need to stay in control of corporate data, even when it goes outside of your organization.


Who goes there?


Today, your mobile workforce accesses company documents and data on their personal mobile devices. That can happen anywhere in the world. What was difficult before would now be impossible.


At the heart of the Microsoft EMS solution is the Azure Rights Management System. It allows you to protect your data as it moves through employees’ mobile devices. Azure RMS secures data using encryption, identity and authorization policies. It works on phones and tablets, as well as personal computers.


It seamlessly integrates with your existing Office 365 environment. That’s important because your employees are already using their mobile devices to create and share documents.


Now you’ll have control over who’s allowed to access documents. Those documents are protected when they’re created. That protection travels with the data wherever it goes. Security at that level used to be a monumental task. Identity management required the manual configuration of point-to-point connections. Documents and data were secure only as long as they stayed within your organization.


Information protection scenarios


Here are some of the ways this solution can increase data security at your company:

  • Protection stays with a file, no matter where it is stored. Even on the cloud.
  • Emails can be used to send encrypted attachments. Only authorized recipients can open the attachment, even if it’s removed from the email message.
  • Collaboration across organizations is automatically supported. The Azure RMS cloud interface configures trusts between organizations using Office 365 or an Azure AD directory. Non-users can sign up for a free RMS subscription.
  • Customized rights policy templates make quick work of security policies and protection levels.

Identity management in the cloud


Your employees no longer access files and data only on premises. The only way for security to keep up is to move rights management out of your physical location. Its new position is as a cloud interface. Employees connect to the Azure Active Directory in the cloud. The cloud becomes the gateway. Employees access only what’s allowed. You can even track document access. Here are some of protective features this mobility solution provides:


  • You can encrypt files and protect them with policies based on individual Azure ID identities.
  • You can restrict or prevent files from being forwarded – even from being copied.
  • You can audit and track access to files. That monitoring can continue even after a file leaves your organization.

It’s simple, and you can deploy it quickly. Because it’s a cloud solution, it scales with your company. It works right out of the box with Office and Office 365 applications. There’s an SDK to integrate protection into software your company creates.


Homefront advance protection


If information protection is moving to the cloud, what keeps your on-premises infrastructure safe? Microsoft EMS is essentially a cloud-based solution. Even so, there’s a component that stays grounded at your location.


It’s called Advanced Threat Analytics (ATA) and it helps you identify suspicious activities before they can do damage. ATA runs inside your organization. It builds a map of all the relations between users, devices, and resources.


If a user accesses resources with devices that don’t have an established relationship, ATA warns you. This unusual activity is a sign that a user’s identity is compromised. Their device could be used for malicious purposes. ATA helps you detect security breaches early, before damage or theft of data occurs.


Protection without interference


Data theft and security breaches are a growing concern for business. It causes devastating financial loss. Mobile device access to corporate data pushes that risk even higher.


Microsoft EMS safeguards data. It’s an information protection solution that doesn’t get in the way of collaboration.

(Visited 170 times, 1 visits today)