Introducing Office 2016 – Takes the Work Out of Working Together

Atidan is pleased to announce the availability of Office 2016! Contact us for a free trial and no obligation briefing and demonstration.

The New Microsoft Office 2016 Video

Office 2016 Product Guide

The new Office—takes the work out of working together

Check out additional resources on our SlideShare site here

The new office is here 1 v2

Collaboration is the way we get things done in the workplace, but the process itself can be complex and frustrating. It shouldn’t have to be. We set out to make working together easier and more impactful by building a suite of integrated apps and services that removes barriers and empowers teams to do and achieve more.

Office has always been the go-to tool for helping individuals do their best work—whether for professional documents, powerful analyses or school presentations. People often start and end their work in Office, but there is often a messy middle that involves a lot of discussion—in person, by phone or via various tools—as well as multiple (sometimes conflicting) inputs. Today we are delivering a set of experiences that is built for making teamwork seamless.

  • We have had real-time co-authoring in all of our web apps since 2013. We are now taking it to the next level by building it directly into our native apps. With this release, we’re making co-authoring in Word real-time, which lets you see what others are writing immediately, as it happens. We’re committed to expanding real-time co-authoring to each of our native apps and you should expect to see more over time.
  • Skype for Business is now available in the client apps, allowing you to IM, screen share, talk or video chat right in your docs. This same experience will be coming to Office Online later this fall. Skype for Business also has faster screen sharing and now adds the option to start a real-time co-authoring session from any conversation or meeting.
  • Keep teams connected with Office 365 Groups, now available as part of Outlook 2016 and in a new Outlook Groups app on iOS, Android and Windows Phone. Office 365 Groups allows individuals to easily create public or private teams. Each group includes a shared inbox, calendar, cloud storage for group files, and a shared OneNote notebook to keep the team productive.
  • Office 365 Planner helps teams organize their work, with the ability to create new plans, organize and assign tasks, set due dates and update status. Planner’s visual dashboards and email notifications help keep everyone informed on the overall progress of their initiative. Planner will be available in preview, to Office 365 First Release customers, starting next quarter.
  • Originally unveiled earlier this year, GigJam is today available in private preview and will become part of Office 365 in 2016. GigJam is an unprecedented new way for teams to accomplish tasks and transform business processes by breaking down the barriers between devices, apps and people.

Works for you

Excel 2016 - New Sunburst Chart

In today’s workplace, we have too many apps, devices and tools—we just don’t have enough time. Office is built to cut through the complexity and help you get things done quickly. It gets work done for you.

Some highlights:

  • Outlook 2016 provides the smartest inbox yet, delivering lightning fast search, removing low priority mail automatically and making sure everyone on the To: line has the right access to modern, cloud-based attachments from OneDrive.
  • We also have significant new updates to OneDrive for Business coming later this month across sync, browser, mobile, IT control and developer experiences. The highlight is the preview of the next generation sync client for Windows and Mac, offering improved reliability and selective sync, as well as increased file size and volume limits.
  • Tell Me helps you easily and quickly find the right Office feature or command, and Smart Lookup brings insights from the web right into your documents. Previously available only in Office Online, Tell Me and Smart Lookup are now available across the Office 2016 client apps.
  • Excel 2016 now includes integrated publishing to Power BI and new modern chart-types to help you make the most of your data.
  • The cloud-powered most recently used documents list allows you to pick up right where you left off in seconds, because it travels with you across your devices whether working in Office Online, the mobile apps or in the 2016 client apps.

Perfect with Windows 10

Office Mobile Apps

While we have made a lot of progress on delivering Office cross-platform and remain committed to this strategy, we see Windows as being “home” for Office. Together, Office 365 and Windows 10 are the most complete solution for getting things done.

  • With Windows Hello, you can sign in to your PC and Office 365 with a simple look or a touch—no need to type a password anymore.
  • In the coming months, Cortana will get even smarter and more useful by gathering intelligence on Office 365 through Outlook 2016 support.
  • With the Office Mobile apps and Continuum on Windows phones, your phone can act as a desktop, and you can project, create or edit your presentation or sales budget from your phone to a monitor while using the same phone to take notes with the OneNote app.
  • Sway on Windows 10 was released in early August, and customers love it! It has received a 4.6/5 app store ranking, with customers calling it “funtastic,” “brilliant” and “elegant.” People love Sway’s simple and intuitive yet powerful approach to next-generation digital storytelling. With Sway, you provide the content, and Sway creates beautiful, shareable, interactive stories that look great on any screen.
  • Our Office Mobile apps on Windows 10 (Word, Excel and PowerPoint) have also received great reception and 4+ app store rankings. Customers say they are touch-friendly, fast and easy to use—making them wonderful for on-the-go-productivity.

For the enterprise

Office 2016 apps with Office 365 provide the most secure Office yet. We are adding built-in Data Loss Prevention (DLP) to significantly reduce the risk of leaking sensitive data by giving IT admins tools to centrally create, manage and enforce policies for content authoring and document sharing. Multifactor Authentication ensures secure access to content anywhere when employees are away from the corporate network. We are also adding Information Rights Management to Visio. Then, later this year, we will be enabling Enterprise Data Protection (EDP) in Windows 10, with support in Office Mobile, which allows more secure corporate content sharing across corporate managed apps and network/cloud locations, preventing inadvertent content sharing outside corporate boundaries. We will be following up with EDP for Office on Windows desktop in early 2016.

Some of our favorite enterprise apps—Visio and Project—have been updated as well. With Visio 2016, customers can get started quickly with diagramming using starter diagrams and contextual tips. Bringing process models, manufacturing plant or IT architecture to life is now only one step away. With Project 2016, customers can streamline resource engagement processes, manage resource pools through visual heat maps, benefit from multiple timelines, and create custom experiences in Project desktop through write-back capabilities for add-ins.

We are also making deployment easier and have a lot of other new capabilities to help IT professionals, as announced in our blog to IT admins two weeks ago.

Office 2016 for Mac

The new office is here 4 v2

In July, we released Office 2016 for Mac to our Office 365 customers. The new versions of Word, Excel, PowerPoint, Outlook and OneNote are a significant step forward and provide the best of both worlds for Mac users—a familiar Office experience paired with the best of the Mac platform. The level of engagement and excitement about this Office for Mac release has surpassed our expectations. As promised in July, today Office 2016 for Mac will also be available as a one-time purchase.

Ongoing Office 365 customer value

Whew—that was a lot! With this release, we’re also shifting the cadence of Office on Windows to feel much more like the cadence we have on the Office mobile and web apps, which release every month with new value. So, going forward, Office 365 customers will now enjoy new features and capabilities delivered continuously in the Office desktop applications as part of their subscription. It’s a new day for our desktop apps.

And as a bit of a teaser, here are some examples of the types of new features and benefits Office 365 customers will see:

  • Built for teamwork—We’re committed to rich co-authoring and collaboration across our native clients, starting in Word 2016, with other big advances in collaboration coming throughout the year. By the end of 2015, we’ll introduce Office 365 Groups insights and discovery in Office Delve. In addition, we will have a new generation of personal work analytics in Office Delve that will help individuals, teams and organizations to be more effective at work by understanding their reach and impact, time allocation and network.
  • Works for you—For those of you who are excited about our new charts and forecasting, we will be delivering even more new charts, formulas, connectors and other Excel capabilities throughout the year. (If you’re interested in telling us which charts and charting features you’d like to see first, we have a survey going on our Excel Facebook page right now!). We also have some very exciting developments in the pipeline for PowerPoint that will make it easier to design and deliver presentations to wow and engage your audience.
  • Perfect on Windows 10—We are especially excited about how even more valuable your personal assistant Cortana can be when she has insights from Office. This will start to allow Cortana to unlock helpful scenarios, like retrieving your documents, preparing for meetings and more.

Get started

  • Are you ready to purchase? Buy Office 365 to get the new 2016 apps – contact us at office365@atidan.com
  • Are you an existing Office 365 customer who is ready to upgrade? Go here for instructions on how to upgrade to Office 2016 for home, or here for business customers.
  • Do you want to learn more? Go to office.com/2016.

Credit for this blog content is from Microsoft blog https://blogs.office.com/2015/09/22/thenewoffice/

How Does The Cloud Change The Way We Do Business?

“Crawl, walk, run” is what we are advising clients of all sizes when it comes to the cloud. Atidan is helping to deliver a variety of cloud services including backup, test/development servers, production servers, application and mobile services, advanced security solutions and much more. Contact us for a no obligation analysis and briefing to find out your best path to the cloud.
 

This article excerpt, by Stewart Parkin, originally appeared here: http://bit.ly/1AM21pt 
How has the cloud revolution enabled businesses to be more efficient and cutting edge? Let’s count the ways. There are many.
Effective and Inexpensive
First of all, the cloud has made businesses more cost effective by allowing them to store unlimited amounts of data inexpensively. Companies don’t have to spend exorbitant amounts of money to access cloud technology. A major capital expenditure is not necessary to access cloud based applications. This cost saving allows businesses to be more efficient and streamlined. This is just one of the many benefits of what the cloud has to offer.
Performing Varied Functions
For example, customers can have instant access to information and services using only a laptop or using their smartphones. The cloud allows them to perform a variety of functions online ranging from shopping, reading, participating in discussions, and many more, all in one place. Cloud technology essentially offers the end user a one-stop portal. There is no need to flip through the yellow pages of your old phone company.
Mobility
The same is true for a company’s employees. They can have instant access to company files and information allowing them to interact with the home office, suppliers and customers. The data they need can be accessed instantly in one convenient place on the web, saving them time and making them more efficient.
In fact, access to cloud-based applications also allows employees more mobility and freedom. While traveling the globe, all they need is access to the Internet via a laptop or their smartphone, or just have to pop into an Internet café to access their data in the cloud. Their data and important documents and files can be safely stored and accessed in the cloud, allowing them to travel without worries, with peace of mind.
Instant Access
Collaboration is a breeze thanks to the cloud. Businesses can share information with their suppliers and employees, allowing them to access important data instantaneously. Sharing information, ideas and data has never been so easy.
Improved Technology
In addition, the cloud has helped businesses in a variety of other ways, including compliance and risk management, customer relationship management, enterprise resource planning, E-commerce, help desk and support services, document management, disaster recovery, and supply chain management. All of these tasks have been made easier thanks to the advent of the cloud. As the technology keeps improving, there will be many more ways in which the cloud can help companies become more efficient.
So, for these and many other reasons, the cloud has changed the way we do business. What’s there not to like? The cloud has changed the way we do business for the better.
Contact Atidan today at azure@atidan.com to find out more about our cloud solutions!

Microsoft Exchange Advanced Threat Protection Launch

Pleased to announce that an Advanced Threat Protection (ATP) service is available now to all Exchange/Office 365 subscribers (Coming August 1 for volume (Open/EA) license customers). You already have Microsoft’s Exchange Online Protection (EOP) at no charge to protect against spam and malware. Exchange Advanced Threat Protection or ATP is a new offering launched this week and is priced at $2 per user per month. You can activate any number of licenses to suit your needs – try it for your top executive team, for users who work with sensitive content or for your entire enterprise.

Key benefits and my comments include:

1.  Better protection against day zero viruses and unknown malware

  a.  Even after EOP filtering, something that has never been seen before can get through filters

  b.  Machine learning with behavior analysis watches content and makes real time validations called Safe Attachments

    i. Could cause possible message delays in suspicious message receipt fyi

2.  Real time protection against malicious URLs

   a.  Protect against phishing attacks and redirection

   b.  Check is performed at time of reading

         i.  Note this could cause a time delay while URL is scanned as the link is clicked

3.  Reporting and URL Tracing

a.  Analyze patterns of attacks, categories of attacks and conduct investigations

It is hard to put a value on this service but the cost is insignificant compared to the cost of an attack such as the Cryptolocker virus. One single incident could dwarf the costs of this subscription and I’ve posted a great white paper study from Ponemon detailing the average data breach cost .

Active Atidan clients can get our assistance to turn on this service at NO CHARGE. Additional consulting is always available to help you with new security features in Office 365 such as Rights Management, Encryption, eDiscovery, Legal Hold, Archiving and more.

Exchange Online Advanced Threat Protection

Protect your email in real time against unknown and sophisticated attacks.

Secure your mailboxes against advanced threats

New malware campaigns are being launched every day, and Office 365 has a solution to help protect your email against them. With Exchange Online Advanced Threat Protection, you can protect your mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it complements the security features of Exchange Online Protection to provide better zero-day protection.

Protect against unsafe attachments

With Safe Attachments, you can prevent malicious attachments from impacting your messaging environment, even if their signatures are not known. All suspicious content goes through a real-time behavioral malware analysis that uses machine learning techniques to evaluate the content for suspicious activity. Unsafe attachments are sandboxed in a detonation chamber before being sent to recipients. The advantage is a malware free and cleaner inbox with better zero-day attack protection.

Protect your environment when users click malicious links

Exchange Online Protection provides protection against malicious links by scanning content. Safe Links expands on this by protecting your environment when users click a link. While the content is being scanned, the URLs are rewritten to go through Office 365. The URLs are examined in real time, at the time a user clicks them. If a link is unsafe, the user is warned not to visit the site or informed that the site has been blocked. Reporting is available, so administrators can track which users clicked a link and when they clicked it.

Get rich reporting and track links in messages

Gain critical insights into who is being targeted in your organization and the category of attacks you are facing. Reporting and message trace allow you to investigate messages that have been blocked due to unknown viruses or malware, while URL trace capability allows you to track individual malicious links in the messages that have been clicked.

Tapping Cloud Computing’s Full Potential

Even Atidan’s Cloud forward clients have only just begun to scratch the surface of possible opportunities. The power of the cloud is now within reach of even the smallest of companies and can change the way business views technology. Enhanced reliability, performance, security and a drastic reduction in physical infrastructure brings many benefits. Please contact the Atidan cloud team today for a no obligation analysis and briefing  Azure@atidan.com
This article excerpt, by Louis Columbus, originally appeared here: http://onforb.es/1zDfn6M 
Enterprises are realizing only 35 percent of the value from their workloads already in the cloud. Leading enterprise cloud adopters have migrated nearly two-thirds of their workloads to the cloud, yet the average company has only 18 percent there.
Up to 50 percent of the value of cloud investments is predicated on streamlining and improving company operations.
These and other insights are from the recently published Bain & Company study, Tapping Cloud’s Full Potential. A downloadable version of the study is available here (8 pp, free no opt-in). Bain & Company interviewed 428 companies and found that enterprises that are focused on getting strategic value from their cloud investments aim to migrate at least 50 percent of their workloads to the cloud.
Key take-aways from the study include the following:
• Only 35 percent of the value from workloads in the cloud today is being realized, leaving 65 percent of their value untapped. Enterprises have the potential to gain much greater value from the workloads they already have in the cloud. This figure from the study shows current realized value versus potential value.
• Bain advises enterprises that want to lead their markets to take a “cloud first” approach to initiating new IT workloads. Taking a cloud first approach requires redefining how new IT operational models scale to support and accelerate emerging and existing business models. This graphic illustrates this point.
• Bain found that putting workloads on public or hybrid clouds delivers more value in the form of bigger cost savings, greater flexibility, more scalability and better built-in services. Bain cites enterprises that moved development to IaaS and PaaS clouds from Amazon Web Services (AWS) reducing downtime by 72 percent and improving application availability by 3.9 hours per user per year.
• Change management is essential for any enterprise to realize the full value of their cloud investment. Bain found that no matter how much effort is put into planning, piloting and implementing cloud technologies, up to 50 percent of the value of cloud investment is predicated on streamlining company operations first. Change management strategies endorsed and evangelized by senior executives is critical for cloud-based systems and platforms to succeed.
• Enterprises that take an agile development approach and tighten the integration between development and infrastructure with DevOps practices increase the probability of cloud project success. Bain sees enterprises that standardize their development platforms, leverage automation tools and take advantage of self-service options for stakeholders succeed with their cloud initiatives.
• Investments in virtualization pay off. Bain also found that well-run IT organizations with 60 percent to 75 percent of their traditional server environments virtualized are able to migrate faster than those that are less reliant on virtualization.

Utilizing Azure Cloud for SharePoint With Always On SQL Server

Atidan is pleased to deploy Microsoft’s Azure Cloud architecture for SharePoint with SQL Server AlwaysOn Availability Groups.Utilizing best recommended practices documented by Microsoft, the Atidan team creates SharePoint 2013 Server farms deployed in an Azure cross-premises virtual network. This blog article shows some of the main steps we take and contains links to the latest information and reference.

Atidan team makes this process easy by managing the entire process from architecture,POC, test and into production. We utilize System Center (SCOM) to monitor all Azure operations and keep watching your critical infrastructure in the cloud. Many options are available to provide security, reliability, performance and to meet your budgets. Contact us today to find out about our “Azure Cloud Jumpstart” solutions!

SharePoint with SQL Server AlwaysOn Availability Groups in Azure guides you through the end-to-end process to:

  • Understand the value of the SharePoint farm in Azure IT workload.
  • Create a proof-of-concept configuration or a dev/test environment for SharePoint application development.
  • Configure the production workload in a cross-premises virtual network.

The result of this process is a functional, high-availability intranet SharePoint farm that is accessible to on-premises users.

site to site VPN

The end-to-end configuration of the production workload consists of these phases:

These phases are designed to align with IT departments or typical areas of expertise. For example:

  • Phase 1 can be done by networking infrastructure staff.
  • Phase 2 can be done by identity management staff.
  • Phases 3 and 5 can be done by database administrators.
  • Phase 4 can be done by SharePoint administrators.

To make the Azure configuration foolproof, Phases 1 and 2 contain configuration tables for you to fill out with all of the required settings. For example, here is Table V for the cross-premises virtual network settings from Phase 1.

table

To make the configuration of the Azure elements as fast as possible, the phases use PowerShell command blocks and prompt you to insert the configuration table settings as variables.

Please contact us at azure@atidan.com for additional information about our Cloud Services!

The Small Business’s Guide to Secure Email

It probably comes as no surprise to most business owners that email is a primary way hackers can gain access to sensitive company data and information. But it may alarm you to know that small businesses are particularly vulnerable. Specifically, overall cyber-attacks on companies with 250 or fewer employees doubled in the first six months of last year—and the loss per attack was more than $188,000 on average. The effect of cyber-attacks on the American economy as a whole is a high cost of $100 billion annually, according to the Center for Strategic and International Studies.

That’s one reason the great Sony email hack of 2014 was such a big deal—it left every business wondering how they could avoid the same fate. It stands to reason that if such a large company, with multiple layers of security, can be hacked, small businesses with fewer resources have no hope, right?

Maybe not. There are many ways to ensure your business is protected through secure email. Since your business’s security is only as strong as your weakest link, the secret is to get employees involved and invested in the success of your security. Here are seven tips to get you started.

  1. Make it a top priority to create and implement a cybersecurity plan.

Of course, this involves more than simply considering how to ensure secure email service—it should also include strategies for keeping your website, payment information, and other information safe—but addressing email security should be a main part of your plan. The Federal Communications Commission created a handy tool, the Small Biz Cyber Planner 2.0, to assist you in creating a customized plan.

  1. Consider email encryption.

Email encryption helps to protect personal information from hackers by only permitting certain users to access and read your emails. There are several methods of email encryption depending on the level of security—and convenience—you require. For example, you could download or purchase extra software that will plug in to your Microsoft Outlook. Gpg4win is one such free privacy email guard software for Windows. Or, you could install an email certificate like PGP (Pretty Good Privacy), which allows your employees to share a public key with anyone who wants to send them an email and use a private key to decrypt any emails they receive. Another simple solution is to use a third-party encrypted email service.

  1. Ensure passwords are secure.

All employees should have their own password for their work computer and email system. These passwords should be reset every three months; also consider requiring multifactor authentication when employees change their passwords. The strongest passwords consist of at least 12 characters and a combination of numbers, symbols, lower-case letters, and capital letters. Passwords should not be something obvious (e.g., birthdays, children’s names, etc.) but should be memorable. In other words, employees should steer clear of the two most common—and worst—passwords of 2014: “password” and “123456.”

Also, employees should not use the same password for multiple accounts or websites. Consider allowing the use of a password manager or single sign on function. Some great solutions for small businesses looking for tools to store codes, bank accounts, email accounts, PIN numbers, and other account information in one place include CommonKey, LastPass, and Password Genie.

How do you know whether your password has been compromised? Sign up for watchdog services like PwnedList or Breach Alarm, which monitor leaked passwords and will report automatically to you if any of your email addresses are vulnerable.

  1. Develop an email retention policy that makes sense.

With the cost of storage today, there’s no point in keeping old emails that are no longer useful. Ask employees to purge emails that do not support business efforts and implement a policy to ensure compliance. Many companies institute a 60-90-day standard, with steps toward automatic archiving and permanent removal after a set time period. Remembering to delete emails that don’t comply with this standard can be difficult for some employees, so frequent reminders may be necessary.

  1. Train employees in email security.

Employees play a crucial role in keeping data secure through email. They should be trained on what types of behaviors to refrain from and what types of emails to avoid. Unfortunately, according to InfoSight, nearly half of all companies spend less than 1 percent of their security budget on programs that train employees on how to be aware of security threats. Yet 64 percent of organizations experienced some level of financial loss due to computer breaches and 85 percent detected computer viruses. Wouldn’t it be worth the low cost of training to mitigate the potentially large cost of a hack?

Specifically, employees should be trained to comply with the following rules:

  • Never open links or attachments from unknown persons.
  • Don’t respond to emails that request a password change and require you to divulge personal information—no matter how official the source appears.
  • Ensure antivirus and anti-spy software is updated on your computer.
  • Encrypt any emails containing sensitive data before sending.
  • Don’t use your company email address to send and receive personal emails.
  • Don’t automatically forward company emails to a third-party email system.

In addition, some companies have found success in instituting programs that test employees with phishing campaigns, spear-phishing emails, and other cybersecurity threats and then reward them when they pass these tests.

  1. Maintain strict standards for company-related mobile device usage.

When using a company-issued mobile device, or a personal mobile device where you send and receive company emails, employees should encrypt data, keep the device password-protected, and install approved security apps so hackers cannot access devices via shared WiFi networks.

  1. Avoid common pitfalls when securing email.

Besides all of the things we’ve already discussed, email can remain unsecured in other ways as well. Be sure to consider the following:

  • All computers—not just a few—should use email encryption. There’s no point in encrypting emails unless the same standard is applied across the board.
  • Unlocked computers should never be left unattended. Make it company policy for employees to lock their computers (which should be password-protected at login) before getting up from their desks.
  • Store emails in a secure location behind a firewall. Do not allow employees to store copies of emails in their personal cloud or any other such location.

By being purposeful when creating policies involving your small business’s emails, you will head off a lot of issues before they even come to pass. Get employees on board and reward them for assisting in developing an environment where information is secure. Together, it’s possible to keep employee, customer, and business data safe—one email at a time.

Reference: Microsoft Office Blog: http://blogs.office.com/2015/05/12/the-small-businesss-guide-to-secure-email/

New Intune Release – Desktop and Mobile Device Management and Security

As part of the name change to ‘Microsoft Intune’ a new look and feel has been released this week.  Contact the Atidan team at intune@atidan.com for information on how to manage and secure all of your devices.

New Intune standalone features that will be released as part of this service update include:

  • Enhanced user interface for Intune administration console
  • Ability to restrict access to Exchange on-premises email based upon device enrollment
  • Bulk enrollment of devices using a single service account
  • Lockdown of Supervised iOS devices and devices using Samsung KNOX with Kiosk mode
  • Targeting of policies and apps by device groups
  • Ability to report on and allow or block a specific set of applications
  • Enforcement of application install or uninstall
  • Deployment of certificates, email, VPN and WiFi profiles
  • Ability to push free store apps to iOS devices
  • More convenient access to internal corporate resources using per-app VPN configurations for iOS devices
  • Remote pin reset for Windows Phone 8.1 devices
  • Multi-factor authentication at enrollment for Windows 8.1 and Windows Phone 8.1 devices
  • Ability to restrict administrator access to a specific set of user and device groups
  • Updated Company Portal apps to support customizable terms and conditions

Intune Mobile App Management - AtidanMicrosoft Intune - Atidan

Mobile Device Management (MDM)

With the increasing volume and diversity of corporate and personal devices being used in organizations today, a growing challenge for IT departments is keeping corporate information secure. Intune helps minimize complexity by offering mobile device management through the cloud with integrated data protection and compliance capabilities.

  • Provide a self-service Company Portal for users to enroll their own devices and install corporate applications across the most popular mobile platforms
  • Deploy certificates, WiFi, VPN, and email profiles automatically once a device is enrolled, enabling users to access corporate resources with the appropriate security configurations
  • Deliver comprehensive settings management for mobile devices, enabling the execution of remote actions such as passcode reset, device lock, data encryption, and full wipe to protect corporate data on lost or stolen devices
  • Protect corporate data by restricting access to Exchange email when a user tries to access resources on an unenrolled or non-compliant device based upon policies set by the administrator
  • Simplify enrollment of corporate devices with bulk enrollment using Apple Configurator or a single service account, enabling IT administrators to set policies and deploy applications on a large scale
  • Enable the enforcement of more strict “lock down” policies for Supervised iOS devices, Android devices using Kiosk Mode, and Windows Phone devices using Assigned Access
Mobile Application Management (MAM)

Employees are demanding access to corporate applications, data, and resources from their mobile devices. Intune addresses this challenge by building manageability and data protection directly into the Office mobile apps your employees are most familiar with. Intune also provides the flexibility to extend these capabilities to existing line-of-business apps and to enable secure viewing of content using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps.

  • Enable your workforce to securely access corporate information using the Office mobile apps they know and love while preventing leakage of your company’s data by restricting actions such as copy/cut/paste/save in your managed app ecosystem
  • Apply the same management policies to your existing line-of-business (LOB) applications using the Intune app wrapper, without requiring code changes in those LOB apps
  • Allow users to securely view content on devices within your managed app ecosystem using the Managed Browser, PDF Viewer, AV Player, and Image Viewer apps for Intune
  • Allow administrators and device users to protect corporate information through selective wipe of managed apps and related data when a device is unenrolled, no longer compliant, lost, stolen, or retired from use
  • Enable administrators to push required apps automatically during enrollment and allow users to easily install corporate apps from the self-service Company Portal
  • Provide the ability to deny specific applications or URL addresses from being accessed on mobile devices
PC Management

As the number of device types allowed in corporate environments grows, management becomes more challenging. Intune provides a comprehensive management solution through a single administrative console that allows you to manage across a variety of devices, including PCs and laptops.

  • Integrate your existing System Center 2012 Configuration Manager infrastructure with Intune, further enhancing your ability to manage PCs, Macs, and Unix/Linux servers, as well as mobile devices from a single management console, while building on existing investments and skills
  • Provide real-time protection against malware threats on managed computers, keep malware definitions up-to date, and automatically scan computers to help protect against malware infections and other potentially unwanted software
  • Collect information about hardware configurations and software installed on managed computers, allowing you to generate reports, organize groups of computers, and more effectively target software deployments
  • Simplify administration by deploying software and configuring Windows Firewall settings on computers based upon policies defined by the administrator