Download presentation
Presentation is loading. Please wait.
Published bySheena Henry Modified over 9 years ago
3
Data Devices People 6.5B Wireless connections today >42% of global population owns smartphone by end of 2015 >50% User will go to tablet or smartphone first for online activities by 2018
4
Device, network and app diversity is staggering The network perimeter has vanished Hackers threaten Sony employees Attacks have become organized, targeted, and persistent Businesses are moving faster than IT Another major retailer hacked
5
Cloud is here
10
IDP Active Directory Azure Active Directory Microsoft Account Other IDP’s 1 Create Account or proves identity Create and trust unique key Authentication by validating this signed request 2 3 Resource 4 Authentication token Trusts tokens from IDP User Unlock Windows identity container w/ PIN or Hello Token binding Access Token Relying Party
13
Data Protection
15
IDP Active Directory Azure Active Directory Microsoft Account Other IDP’s 1 Create Account or proves identity Create and trust unique key 2 MDM 4 Authentication token User Unlock Windows identity container w/ PIN or Hello MDM enrollment EDP Policies Key Management Enterprise allowed apps Network / Storage App data flow management Block or Allow/Audit controls Selective wipe on un-enroll
16
Personal Apps & Data (Unmanaged) Business Apps & Data (Managed) Data exchange is controlled
18
UPDATE ARTWORK Cortana assets from Shane Early Designs Not Final UI
19
Office Early Designs Not Final UI
20
UPDATE ARTWORK Cortana assets from Shane Pasting content from a Fabrikam file to a personal file is discouraged, and if you choose “paste anyway” your action and the content will be logged for IT review. Early Designs Not Final UI
22
One consistent set of MDM capabilities across Mobile, Desktop, and IoT Provisioning Bulk enrollment Simple bootstrap Converged protocol Azure AD Integration Extended set of policies Context based policies Client certificates – Direct install (PFX) Enterprise Wi-Fi profiles VPN profiles Email provisioning MDM Push when user not logged in Kiosk Mode, Start screen configuration and control Curated Windows Store Business Store app distribution License reclaim/re-use Enterprise App management LOB app management App inventory (MDM/Store) App allow/deny list Enterprise data protection Remote Lock, PIN reset, Ring, Find Full device wipe Un-enrollment with alerts Removal of configuration & EDP protected data ENROLLMENT INVENTORY APPLICATION MANAGEMENT DEVICE CONFIGURATION AND SECURITY REMOTE ASSISTANCE UNENROLLMENT Enhanced inventory for compliance decisions
23
Access please 1 Blocking unhealthy devices to protect resources and prevent proliferation Important resources OneDriveFile Servers EmailWireless 2 Prove to me you are healthy Windows PPCH and Intune Trusted Boot and Integrity Data (Azure AD) 3 Request Here is my proof 5 Approved 4 Client policies state (MDM)
28
Online with Mobile Device Management
31
Key-based AAD subscriptionAAD subscription AAD Sync w/ NGC key write-back AD DS 10 DCs AD FS 10 Cert-based AAD subscription PKI infrastructure Intune AAD subscription PKI infrastructure SCCM 2015/Intune AD DS 10 schema AD FS 10 PKI infrastructure SCCM 2015
32
Cloud is here
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.