Preview

I Love It

Powerful Essays
Open Document
Open Document
1840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
I Love It
Unified Device Management Allows Centralized Governance of Corporate Network Devices

Published July 2013
Situation
Microsoft Information Technology (Microsoft IT) lacked a timely solution for keeping pace with the surging trend of employees who use personal devices to do Microsoft work. Without a user- and IT-friendly way to bring all devices into the scope of centralized management, IT risked improper exposure of secure company data, among other concerns.
Solution
Microsoft System Center 2012 Configuration Manager SP1 with Windows Intune™ enables Unified Device Management (UDM) to allow flexible, centralized management for company-owned and user-owned devices while maintaining corporate compliance and control. Benefits | Native support management using SCCM and Windows Intune.Simplified implementation--no new infrastructure, hardware, network complexity or custom coding.Enterprise-level scalability of a cloud-enabled device management solution. | Cohesive balance of user productivity with secure IT practices.Centralized administration of all users and all devices via a single interface.Adherence to the Microsoft people-centric IT vision, which puts user identity, single sign-on, and self-service at the core of IT governance technologies and programs. | Products and Technology | Microsoft Active DirectoryMicrosoft Exchange ActiveSyncMicrosoft Online Directory Services | Microsoft System Center 2012 Configuration Manager SP1Microsoft Windows Intune |

Situation
Microsoft Information Technology (Microsoft IT) lacked a timely solution for keeping pace with the surging trend of employees who use personal devices to do Microsoft work. Without a user- and IT-friendly way to bring all devices into the scope of centralized management, IT risked improper exposure of secure company data, among other concerns.
Solution
Microsoft System Center 2012 Configuration Manager SP1 with Windows Intune™ enables Unified Device Management (UDM) to allow flexible,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Agree to proper use of their devices when working with company data both on-site and off-site…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    ch02 c

    • 2468 Words
    • 11 Pages

    4. Thanks to the wide availability of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers throughout the organization who no longer have to struggle to find the information they need to make sound decisions or do their jobs.…

    • 2468 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Network management entities can be programmed to notify of operations, logs or shutdown on the system, and deploy repair tools. These programmable entities can check values in the end station for variables in the cisco environment for immediate response by the means of agents which are software modules. That helps the management units or entities with stored info in a manage database by these agents through the means of network management protocol such as SNMP or CMIP.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The IT department along other members of the governance committee will need to meet to develop standard protocols, policies and guidelines that clearly communicate the BYOD expectations. Employees need to fully understand that the use of an MDM platform allows FRH to access their device…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    For the past couple of years, a policy that allows employees to bring their own personal devices to work has become progressively popular. This policy is known as BYOD, an acronym that stands for “bring your own device”. One of the main reasons for the growing usage of the policy is the increase in employee productivity as they are already familiar with the equipment they are using at work. Although this reliance on technology is efficient and produces numerous benefits in the business sector, it also brings several problems along with it. Certainly, the risk of losing valuable data has become an imposing threat nowadays, making…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Managerial Issues

    • 729 Words
    • 3 Pages

    When it comes to an organization’s information technology, the infrastructure management is part of the essential operations along with processes, equipment, policies, human resources, data, and external contracts. The goals of infrastructure management is to reduce duplication effort, enhance the flow of information throughout an information system, ensure an adherence to standards, promote adaptability necessary for a changeable environment, maintain effective change management policies, and ensure interoperability among organizational and external entities. (1)…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The advent of technology in the workplace has revolutionized the way the world does business. This is true with computers, which sets the stage for the technology globally. Global businesses can now be run by a single person, and a single computer can do the work of thousands. Large organizations have taken advantage of cutting-edge technology and developed powerful tools to help them harvest, analyze, and disseminate information, in order to make them more competitive. Human Resources, Marketing, and Accounting are just a few organizational departments running “smart” applications to run the business more smoothly.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Better Essays

    In today’s business world the security and privacy of employee files, business trade secrets and proprietary information has became an increased problem. The information is being compromised and/or stolen from within the business environment itself. The files are not protected from unauthorized individuals. These files can be protected using various methods, such as individual user accounts or profiles, storing paper files in a secured area as well as, improved electronic data storage.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Best Essays

    The information technology advancements continue to impact the workplace, societies and cultures. In today’s world, information technology is almost part of every business, educational institute, and even personal activity (Brooks, 2010). Computer and internet access have found their way to households, schools, libraries, people’s cell phones, banks, hospitals, governments, coffee shops, and other public places. As the industry evolves, so do the needs and special niches of society from mainframe systems, to micro systems, to PC-based LAN and WAN systems, to virtual systems and the internet.…

    • 1836 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Week 4. Team Reflection

    • 609 Words
    • 2 Pages

    Throughout this course, we established a foundation in understanding Business Information Systems. This week’s objectives were to describe how wireless technologies are used in the workplace and how to use spreadsheets in business situations. While some members of Team A were well versed in Microsoft tools, others had their first lesson on Microsoft’s Excel and Access fundamentals.…

    • 609 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information technology has become integrated in every task whether at work or outside work. It delivered the organisations with range of new possibilities for performing different activities at work and structuring the business (Lindstrom, Moberg & Rapp, 1997). It became more challenging due to the rapid change (Garnter, 1999).…

    • 978 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Cisco Unified Communications Manager system extends enterprise telephony features and functions to packet telephony network devices such as IP phones, media processing devices, voice-over-IP (VoIP) gateways, and multimedia applications. Additional data, voice, and video services, such as unified messaging, multimedia conferencing, collaborative contact centers, and interactive multimedia response systems, interact through Cisco Unified Communications Manager open telephony application programming interface (API).…

    • 209896 Words
    • 840 Pages
    Powerful Essays
  • Good Essays

    As technology continues to roll uphill, millions of people rely on computers to perform everyday tasks in the work environment.…

    • 899 Words
    • 4 Pages
    Good Essays