Exportar (0) Imprimir
Expandir Tudo
EN
Este conteúdo não está disponível em seu idioma, mas aqui está a versão em inglês.

Access and Information Protection

Published: June 24, 2013

Updated: August 28, 2013

Applies To: Windows Server 2012 R2



One of the most prevalent IT industry trends at the moment is the proliferation of consumer devices in the workplace. Employees and partners want to access protected corporate data from their personal devices, from checking email to the consumption of advanced business applications. IT administrators in organizations, while wanting to enable this level of productivity, would like to ensure that they can manage risk and govern the use of corporate resources.

Following are some of the cross-technology Access and Information Protection solutions you can implement in your organization:

 

Solution Area Description

Secure Access to Company Resources from Any Location, on Any Device

Device and Access Management

Addresses how you can implement an end-to-end solution for managing corporate-owned and personal devices, and at the same time providing secure and seamless access to corporate applications and resources.

Manage Identities for Hybrid Environments Using DirSync with Password Sync

Hybrid Identity

Describes a hybrid identity solution that uses DirSync with Password Sync to synchronize on-premises Active Directory with Windows Azure Active Directory.

Manage Identities for Hybrid Environments Using DirSync with Federation (Single Sign-On)

Hybrid Identity

Describes a hybrid identity solution that uses DirSync with AD FS and Federation (SSO) to synchronize on-premises Active Directory with Windows Azure Active Directory and provide a seamless single sign-on experience.

Dynamic Access Control: Scenario Overview

Information Protection

Provides a solution to apply data governance across corporate resources and set up policies to exercise control to who can access the data. You can also set up audit access to files for compliance reporting, and apply rights-managed protection for sensitive documents.

In addition to security and access, IT also needs to have a good strategy in place to manage PCs and personal devices from a single administrator console. Managing devices includes setting security and compliance settings, gathering software and hardware inventory, or deploying software. IT also must have a solution in place to protect the company by wiping corporate data stored on the mobile device when the device is lost, stolen, or retired from use.The solution, Manage mobile devices and PCs by migrating to Configuration Manager with Windows Intune explains in detail the Unified Device Management solution.

See Also

Isso foi útil para você?
(1500 caracteres restantes)
Agradecemos os seus comentários

Contribuições da comunidade

ADICIONAR
Mostrar:
© 2014 Microsoft