Don’t Leave Holes in Your Office 365 Access Control Strategy
Jun13

Don’t Leave Holes in Your Office 365 Access Control Strategy

Secure every access point to Microsoft Office 365 emails and data with VMware Workspace ONE. If your organization is like most, you’re either using Microsoft Office 365 or thinking about an Office 365 implementation. Since the data and email in Office 365 are vital to your business, you’ve probably thought through how to protect access to Office 365 with application access control policies and mobile email management (MEM) tools. You...

Read More
Azure AD Join with VMware Workspace ONE
May01

Azure AD Join with VMware Workspace ONE

Secure, timely support for remote Windows users can be tricky. Imagine your top remote sales rep breaks her laptop before an onsite meeting with a vital client. Does she have time to wait for IT to grab a new laptop, Domain Join it for secure access to corporate resources and then ship it out? Even if there is time, she’ll worry about her meeting, and you’ll get plenty of requests for updates. Instead, imagine that your rep simply...

Read More
[Video] Make Legacy Application Access Simple with VMware & F5
Jan23

[Video] Make Legacy Application Access Simple with VMware & F5

Your end users leverage consumer apps every day that deliver just what they want, just when they need it. These consumer apps and app delivery platforms—the App Store, Google Play—have raised expectations for users: all important apps should be available anywhere. For your IT organization, this presents an opportunity to delight end users with apps and digital workspaces that are exactly that—simple and accessible wherever users need...

Read More
Single Sign-On (SSO) to Legacy Apps Using BIG-IP & VMware Workspace ONE
Oct18

Single Sign-On (SSO) to Legacy Apps Using BIG-IP & VMware Workspace ONE

At VMworld Europe 2016, VMware and F5 announce new collaboration that enables simple and secure single sign-on (SSO) to a broad range of business apps—mobile, cloud, SaaS and legacy applications. Many IT organizations have a simple goal: make it easy for workers to access all their work applications on any device. That simple goal becomes complicated, however, when new apps and old apps do not authenticate in the same way....

Read More