网络科技

    今日:816| 主题:246045
收藏本版
互联网、科技极客的综合动态。

[科技] Microsoft and Lookout: Securing all your endpoints begins today

[复制链接]
踮起我腳尖╮ 发表于 2016-10-5 03:54:47
76 0

立即注册CoLaBug.com会员,免费获得投稿人的专业资料,享用更多功能,玩转个人品牌!

您需要 登录 才可以下载或查看,没有帐号?立即注册

x

Microsoft and Lookout: Securing all your endpoints begins today-1 (Microsoft,available,corporate,employees,president)

   Today, we are excited to announce that the  Lookout Mobile Endpoint Security integration with Microsoft Enterprise Mobility + Security (EMS)  is now generally available.
  This means that while enterprise employees more seriously consider mobile devices to be an invaluable tool in their everyday working lives, enterprise IT teams don’t have to struggle to secure the rapidly increasing number of endpoints on their networks.
    “Mobile devices have become the new frontier for cyber attack”
  Doing work without a mobile device is soon to be a forgotten concept. This means that data, or access to corporate data, lives with the mobile device, making the device a valuable target for attackers.
  “The digital transformation that’s affecting every organization brings with it increasingly sophisticated threats – and mobile devices are at the forefront of many cyber-attacks,” said Brad Anderson, corporate vice president of Enterprise Mobility for Microsoft. “The integration between Lookout and Microsoft EMS helps ensure that, despite this increased risk, any enterprise can benefit from mobile productivity with the assurance that their corporate assets are better protected.”
    How the integration works
  In the Lookout and Microsoft EMS integrated solution, Lookout continuously monitors iOS and Android devices for app-, network-, and OS-based threats and risks. It then passes that information directly to Microsoft Intune. If a threat or risk is identified, admins can restrict that device’s access to resources like Microsoft Office 365 using Microsoft’s conditional access policies. When access is blocked, Intune and Lookout walk the employee step-by-step through the process of remediating the threat, in order to regain resource access.
   For more information on how to set up this integration,  here is a great step-by-step guide  published on the Intune documentation site.
   Learn more about how this new technology integration can protect your corporate data today:  www.lookout.com/microsoft
友荐云推荐




上一篇:Yahoo reportedly gave the US government access to all user emails
下一篇:The 5 most shocking revelations from Netflix's Amanda Knox documentary
酷辣虫提示酷辣虫禁止发表任何与中华人民共和国法律有抵触的内容!所有内容由用户发布,并不代表酷辣虫的观点,酷辣虫无法对用户发布内容真实性提供任何的保证,请自行验证并承担风险与后果。如您有版权、违规等问题,请通过"联系我们"或"违规举报"告知我们处理。

*滑动验证:
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

我要投稿

推荐阅读

扫码访问 @iTTTTT瑞翔 的微博
回页顶回复上一篇下一篇回列表手机版
手机版/CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 )|网站地图 酷辣虫

© 2001-2016 Comsenz Inc. Design: Dean. DiscuzFans.

返回顶部 返回列表