请选择 进入手机版 | 继续访问电脑版

网络科技

    今日:254| 主题:277515
收藏本版
互联网、科技极客的综合动态。

[科技] Microsoft and Lookout: Securing all your endpoints begins today

[复制链接]
踮起我腳尖╮ 发表于 2016-10-5 03:54:47
102 0

Microsoft and Lookout: Securing all your endpoints begins today

Microsoft and Lookout: Securing all your endpoints begins today-1-网络科技-Microsoft,available,corporate,employees,president

   Today, we are excited to announce that the  Lookout Mobile Endpoint Security integration with Microsoft Enterprise Mobility + Security (EMS)  is now generally available.
  This means that while enterprise employees more seriously consider mobile devices to be an invaluable tool in their everyday working lives, enterprise IT teams don’t have to struggle to secure the rapidly increasing number of endpoints on their networks.
    “Mobile devices have become the new frontier for cyber attack”
  Doing work without a mobile device is soon to be a forgotten concept. This means that data, or access to corporate data, lives with the mobile device, making the device a valuable target for attackers.
  “The digital transformation that’s affecting every organization brings with it increasingly sophisticated threats – and mobile devices are at the forefront of many cyber-attacks,” said Brad Anderson, corporate vice president of Enterprise Mobility for Microsoft. “The integration between Lookout and Microsoft EMS helps ensure that, despite this increased risk, any enterprise can benefit from mobile productivity with the assurance that their corporate assets are better protected.”
    How the integration works
  In the Lookout and Microsoft EMS integrated solution, Lookout continuously monitors iOS and Android devices for app-, network-, and OS-based threats and risks. It then passes that information directly to Microsoft Intune. If a threat or risk is identified, admins can restrict that device’s access to resources like Microsoft Office 365 using Microsoft’s conditional access policies. When access is blocked, Intune and Lookout walk the employee step-by-step through the process of remediating the threat, in order to regain resource access.
   For more information on how to set up this integration,  here is a great step-by-step guide  published on the Intune documentation site.
   Learn more about how this new technology integration can protect your corporate data today:  www.lookout.com/microsoft



上一篇:Yahoo reportedly gave the US government access to all user emails
下一篇:The 5 most shocking revelations from Netflix's Amanda Knox documentary
我要投稿

回页顶回复上一篇下一篇回列表
手机版/CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 | 粤公网安备 44010402000842号 )

© 2001-2017 Comsenz Inc.

返回顶部 返回列表