{"id":662,"date":"2014-07-22T00:00:00","date_gmt":"2014-07-22T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/07\/22\/how-microsoft-handles-byod\/"},"modified":"2021-01-28T16:17:46","modified_gmt":"2021-01-28T16:17:46","slug":"how-microsoft-handles-byod","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/","title":{"rendered":"How Microsoft Handles BYOD"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<div id=\"social-sidebar\" class=\"oas_box oas_box_btns_lfr\" data-force-refresh=\"true\"> <\/div>\n<p>The &#8220;Bring Your Own Device&#8221; (<a href=\"http:\/\/www.webopedia.com\/sgsearch\/results?cx=partner-pub-8768004398756183%3A6766915980&amp;cof=FORID%3A10&amp;ie=UTF-8&amp;q=byod\">BYOD<\/a>) phenomenon has picked up quite a bit of steam over the last year, matching the <a href=\"http:\/\/www.eweek.com\/small-business\/smartphones-tablets-lead-consumer-electronics-market-growth.html\">uptick in tablet ownership<\/a> and usage patterns. Tablets have graduated from personal content consumption devices into full-blown productivity tools. With the <a href=\"http:\/\/www.eweek.com\/enterprise-apps\/microsoft-office-for-ipad-launches.html\">release of Microsoft Office on the iPad<\/a> came another influx of users wanting to do real work on their personally owned devices.<\/p>\n<p>Most IT organizations have traditionally been opposed to employees attaching their personal devices to the corporate network for security reasons. The primary reason given concerns the unmanaged condition of these devices and the possibility of introducing a virus that could cripple the entire company. Microsoft offers a number of solutions to protect against this type of threat and to make it easy to incorporate the most popular devices.<\/p>\n<h2>Mitigating Network Risks<\/h2>\n<p>One of the primary use cases for accessing the corporate network is the creating and viewing of content primarily using Microsoft Office to include Microsoft Word, Excel and PowerPoint. This typically requires that a computer or laptop be joined to the corporate domain to gain access to file shares and internal network resources. Closely related to the use of Microsoft Office is Microsoft SharePoint for collaboration and document management.<\/p>\n<p>Workplace Join is a capability included in Windows Server 2012 R2 which enables any number of different devices to join a domain in much the same way you would with a typical Windows computer. Microsoft&#8217;s <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dn280933.aspx\">walkthrough guide<\/a> shows the steps required to join an iOS device to a corporate network with the proper Active Directory Federation Services (AD FS) configuration. Once joined to the domain, you&#8217;ll have access to internal websites and other corporate resources.<\/p>\n<p>If you have a Samsung mobile device which supports the <a href=\"http:\/\/www.samsung.com\/global\/business\/mobile\/platform\/mobile-platform\/knox\/\">KNOX <\/a>standard, you have the ability to complete a Workplace Join to Active Directory and Windows Intune for management. The Samsung KNOX platform provides a virtualized container or workspace where all corporate data can be kept separate and secure from personal data. The <a href=\"https:\/\/www.samsungknox.com\/en\/solutions\/knox\/technical\/knox-supported-devices\">list <\/a>of supported devices includes the popular S3, S4 S5 and Note 3 phones, plus tablets running Jelly Bean 4.3.<\/p>\n<h2>Microsoft&#8217;s MDM<\/h2>\n<p><a href=\"http:\/\/www.microsoft.com\/en-us\/server-cloud\/products\/windows-intune\">Windows Intune<\/a> is Microsoft&#8217;s cloud-based device management offering. It&#8217;s also a part of a new offering called the Enterprise Mobility Suite, which includes Azure Active Directory Premium and Azure Rights Management Services. Individual devices must be enrolled in order to fully enable them for management. This process can be completed in a self-service manner if the management portal is configured beforehand. You also must identify device owners as managed users prior to device enrollment.<\/p>\n<p>Managing iOS devices will require obtaining an Apple Push Notification (APN) certificate. Once obtained, it must be made available to Windows Intune through the management portal. You will need an Apple ID associated with a corporate email account accessible by the IT management staff as opposed to a single individual. Once in place, you should be able to self-enroll any iOS device.<\/p>\n<p>Another option for managing mobile devices involves using System Center 2012 Configuration Manager (SCCM). A Windows Intune subscription is still required, and you must connect your SCCM to that subscription. Once that&#8217;s done you&#8217;ll have the ability to manage mobile devices to do things like retire and wipe a device, configure compliance settings like passwords, security, roaming, encryption and wireless communication plus a range of application management functions.<\/p>\n<h2>Designing a BYOD Strategy<\/h2>\n<p>Microsoft offers a number of <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dn656905.aspx\">resources <\/a>to help you create an infrastructure that will securely support a BYOD strategy. It&#8217;s important to identify the types of resources to which you wish to give access and the management approach for each device. For the greatest amount of control, you&#8217;ll need to install a management agent on each device. This will provide the most security and the ability to deploy apps and remotely wipe a device in the case of loss.<\/p>\n<p>Some users will not want a management agent installed on their device and must accept either a lower level of access or additional authentication requirements. Microsoft has a number of options for two-factor authentication, including an automated call-back service. This provides an additional level of security, which should help ease the concerns of even the most risk-averse IT administrators.<\/p>\n<h2>Bottom Line on BYOD<\/h2>\n<p>Allowing personal devices to access resources inside the corporate firewall provides a number of advantages if you can do it securely. It makes it possible for employees to use the devices they prefer and to be productive more of the time.<\/p>\n<p>At the same time, it calls for <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/\/byod-should-begin-with-business-case-ey.html\">new policies and procedures<\/a> to make the ground rules clear. Good tools can make a difference in protecting the corporate network, but there&#8217;s no substitute for good information assurance (IA) training and awareness on the part of employees. Don&#8217;t forget the human aspect when putting any new capabilities in place.<\/p>\n<p><em>Paul Ferrill has been writing in the IT trade press for over 25 years. He&#8217;s written hundreds of articles for publications like Datamation, Federal Computer Week, InfoWorld, Network Computing, Network World and PC Magazine and is the author of two books. He is a regular contributor to ServerWatch.com and several other QuinStreet Enterprise properties.e<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d70670d3db3-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d70670d3db3\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d70670d3db3\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d70670d3db3\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d70670d3db3\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d70670d3db3\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d70670d3db3\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The &#8220;Bring Your Own Device&#8221; (BYOD) phenomenon has picked up quite a bit of steam over the last year, matching the uptick in tablet ownership and usage patterns. Tablets have graduated from personal content consumption devices into full-blown productivity tools. With the release of Microsoft Office on the iPad came another influx of users wanting [&hellip;]<\/p>\n","protected":false},"author":225,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[747,746,532,745],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[294,295,396],"class_list":["post-662","post","type-post","status-publish","format-standard","hentry","category-mobile","tag-byod","tag-mdm","tag-microsoft","tag-mobile-device-management","b2b_audience-implementation-and-support","b2b_product-byod","b2b_product-mobile-device-management","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Microsoft Handles BYOD | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Microsoft Handles BYOD | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-22T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:17:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Ferrill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Ferrill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\"},\"author\":{\"name\":\"Paul Ferrill\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/6de549549ccc6ad53602b0237e8e3681\"},\"headline\":\"How Microsoft Handles BYOD\",\"datePublished\":\"2014-07-22T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:17:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\"},\"wordCount\":869,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"BYOD\",\"MDM\",\"Microsoft\",\"mobile device management\"],\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\",\"name\":\"How Microsoft Handles BYOD | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2014-07-22T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:17:46+00:00\",\"description\":\"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Microsoft Handles BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/6de549549ccc6ad53602b0237e8e3681\",\"name\":\"Paul Ferrill\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/998e37a1b674d5df2e908f11e747cb8e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/998e37a1b674d5df2e908f11e747cb8e?s=96&d=blank&r=g\",\"caption\":\"Paul Ferrill\"},\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-ferrill-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Microsoft Handles BYOD | eSecurity Planet","description":"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/","og_locale":"en_US","og_type":"article","og_title":"How Microsoft Handles BYOD | eSecurity Planet","og_description":"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/","og_site_name":"eSecurity Planet","article_published_time":"2014-07-22T00:00:00+00:00","article_modified_time":"2021-01-28T16:17:46+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Paul Ferrill","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Ferrill","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/"},"author":{"name":"Paul Ferrill","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/6de549549ccc6ad53602b0237e8e3681"},"headline":"How Microsoft Handles BYOD","datePublished":"2014-07-22T00:00:00+00:00","dateModified":"2021-01-28T16:17:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/"},"wordCount":869,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["BYOD","MDM","Microsoft","mobile device management"],"articleSection":["Mobile"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/","name":"How Microsoft Handles BYOD | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2014-07-22T00:00:00+00:00","dateModified":"2021-01-28T16:17:46+00:00","description":"While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/how-microsoft-handles-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How Microsoft Handles BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/6de549549ccc6ad53602b0237e8e3681","name":"Paul Ferrill","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/998e37a1b674d5df2e908f11e747cb8e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/998e37a1b674d5df2e908f11e747cb8e?s=96&d=blank&r=g","caption":"Paul Ferrill"},"url":"https:\/\/www.esecurityplanet.com\/author\/paul-ferrill-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/662"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/225"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=662"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/662\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=662"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=662"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=662"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}