Simplify management of apps & devices
Microsoft Intune provides mobile device management, mobile application management, and PC management capabilities from the cloud. Using Intune, organizations can provide their employees with access to corporate applications, data, and resources from virtually anywhere on almost any device, while helping to keep corporate information secure.
Intune integrates closely with Azure Active Directory (Azure AD) for identity and access control, and Azure Rights Management (Azure RMS) for data protection.
Common business problems that Intune helps solve include:
- Securing your on-premises email and collaboration infrastructure so that it can be accessed by mobile devices and apps on the Internet.
- Securing your Office 365 infrastructure so that it can be safely accessed by mobile devices and apps on the Internet.
- Enabling your organization to issue mobile phones to its employees.
- Enabling your organization to provide limited-use “shared devices” for task workers.
- Enabling your organization to implement a secure “bring your own device (BYOD)” or personal device strategy.
- Enabling your organization to support employees accessing Office 365 from devices and apps that you don’t control, such as a kiosk in the lobby of a trade show.
The primary tools that Intune offers include:
- Mobile device management (MDM): The ability to enroll devices in Intune so that you can provision, configure, monitor, and take actions on those devices, such as wiping them.
- Mobile application management (MAM): The ability to publish, push, configure, secure, monitor, and update mobile apps for your users.
- Mobile application security: As a part of managing mobile apps, the ability to help secure mobile data by isolating personal data from corporate data and allowing the corporate data to be selectively wiped.
These tools are used in different combinations to enable the common business scenarios above. For example, shared device scenarios make heavy use of MDM. BYOD scenarios typically rely on MAM. And the corporate phone scenarios build upon both. Almost all scenarios make use of mobile application security.