Understanding Access and Information Protection Architecture

1 hour, 4 minutes, 11 seconds


Right click “Save as…”

Slides (view online)
+My schedule - My schedule
Today, people want to work anywhere on any device. How do you enable this architecturally, yet retain control and meet compliance requirements? In this session we take a look at how the Microsoft boundary control and information protection solutions enable these scenarios.

Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

Comments closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.