Browse by Tags

Tagged Content List
  • Blog Post: Removing corporate data from devices

    As Carol Burnett often said, “Seems we just get started, and before you know it…” We hope that you enjoyed this blog series (although there was no singing during its creation) and–more importantly–seen some of the newest features of identity, mobile device management, virtualization...
  • Blog Post: Syncing and protecting corporate information

    Work Folders allow you to maintain control of corporate data by storing it on server file shares while making it available consistently across a user’s multiple devices, including when the user’s device is disconnected from the network. Users want to get at the data—which they consider...
  • Blog Post: Registering BYOD devices

    There’s no doubt that an explosion of private, generally unmanaged devices is underway. Sometimes, organizations want to save money and so encouraged users to supply their own devices; sometimes, users would sneak devices in the back door without waiting for IT policy to catch up; and sometimes...
  • Blog Post: Making resources available to users

    Yesterday, we kicked-off our blog series on Access Information Protection (AIP) by talking about setting up the environment . In today’s post, we continue our look at AIP and specifically ways you can make resources available to users, who are connecting from various devices, inside and outside...
  • Blog Post: Setting up the environment

    Last week, we looked at desktop virtualization . Now, let’s turn our attention to Access and Information Protection. In many ways, Access and Information Protection (AIP) are two sides of the same coin. When you think of the term access, you may first think of access controls —that is...