Read the post about access and information protection here , and check out this post about identity and access management. There is also a detailed look at deploying , accessing , and managing/monitoring desktop virtualization.
This new blog has a LOT more than just videos, however. Check out the posts covering cloud on-boarding , this step-by-step guide for enrolling mobile cloud-based devices and configuring mobile device settings , and this multi-part look at how to protect business apps on mobile devices . For some additional reading and ongoing updates, you can check out Microsoft’s official Enterprise Mobility site here .
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.