In today’s technology-driven world, one can’t help but be focused on efficiency and speed to keep up. Constant stimuli inundating us every millisecond of every day. Streaming videos. Entertainment. Business forecasting. Reporting. Instant efficiency, which means instant gratification for every user, all the time. With mobility at its core, users want to be able to access all of their information with any device– including corporate data, tasks and productivity tools.
Mobile-First, Cloud First
Microsoft’s “people-centric” vision enables end users to unify their environment. Formerly, most of the focus was on devices and hardware resources. Today, Microsoft and its partners seek to unite people and their organizations through software and cloud computing. The mobile devices that we use every day were built to consume the cloud, and the cloud is what enables these devices to become such a critical and thoroughly integrated part of our work and Image Credit: Microsoft Enterprise
But how can organizations be sure that the corporate assets being accessed and stored on mobile devices are data compliant and secure? Microsoft has bundled some of their individual cloud offerings to form a comprehensive solution: Enterprise Mobility Suite (EMS).
How Does EMS Work?
The EMS is a bundled enhancement to Microsoft Office 365, and although it is more cost effective, it isn’t a requirement for organizations to have Office 365 to purchase the EMS. It is delivered by the secure Microsoft Azure platform, the same platform that introduced OneDrive for business and Office 365. The EMS is designed to empower enterprise mobility with Bring Your Own Device (BYOD) and Software as a Service (SaaS) capabilities in a cost effective method. As the most comprehensive and complete bundled platform for organizations to embrace new trends in mobility and cloud computing, the EMS can integrate an organization’s on-premise IT needs, straight from the cloud. Aligning with Microsoft’s vision of IT that focuses on the person and not just the device, EMS allows end users to get the experience they want and key IT management, compliance officers and security personnel the control they need.
The EMS bundle has three main components:
Microsoft Azure Active Directory Premium: Provides identities based on people not networks. The built-in identity and access management in this component sets EMS apart from other suites. It also provides enhanced data synchronization, cloud-based self-service password management and single sign-on to all Microsoft and more than 1,200 widely used third-party Software as a Service (SaaS) apps.
Microsoft InTune: Enables BYOD with Mobile Device Management (MDM) from the cloud. InTune also features email management and compliance for iOS, selective wipe of devices and iOS 7 data protection configuration.
Microsoft Azure Rights Management: Protects sensitive company information in three ways. It uses encryption, identity, and authorization policies to help secure your files and email, and it works across multiple devices—phones, tablets, and PCs. This component works in the cloud or in a hybrid model with your existing on-premises infrastructure and provides integration into native applications.
Benefits of EMS:
Unified Infrastructure Technology
Common Identity using Active Directory Domain Services (ADDS) and the cloud, a one-stop shop to manage capabilities for PC and Mobile devices
End-users will be more productive and have a consistent and seamless experience across their devices
IT complexity will be reduced
Corporate data will be better protected
Iron Grip with a Satin Glove
With the rollout of EMS, Microsoft invited only a select few of its partners to join the enterprise in the extensive training of the EMS product. SADA Systems, a Microsoft National Solutions Provider with Gold Competencies, was selected to join Microsoft’s Red Carpet Program for the product’s debut. SADA Systems aligns with Microsoft’s people-centric IT vision, and can provide the balance between access and control: Letting users bring in their own personalized devices and access company resources with them, and keeping IT administrator’s well-controlled network running smoothly and securely.