Device Compliance with Identity Manager – the less obvious implementation details

Everyone likes the idea of Device Compliance checks. It allows us to differentiate between Company-issues, BYOD-enrolled, private and totally foreign devices, assess their security posture and execute access decisions based on this vital data, expanding our Conditional Access options. It is also extremely easy to use, just like that (VIDM Admin Console): Device Compliance can... Continue Reading →

iOS Trustjacking protection with EMM

Trustjacking is a new "scary" attack on iOSnew "scary" attack on iOS devices, exploiting user's lack of understanding or what's going on. When plugging into an unknown computer or charger user may choose to "trust" it, which allows the remote device quite a degree of access to iPhone/iPad data. Many don't realize that this trust... Continue Reading →

Create a free website or blog at WordPress.com.

Up ↑