In 2020, most of us around the globe had to make the move from office to home – either for months, a year, or for some us, we’re still there. But business had to continue. So as the workforce packed up their phones, tablets and laptops, how could we ensure business could continue as usual and operate securely? The answer is with device/endpoint management.
One of the more popular platforms being used by organizations to do just this – and one of the leaders in this space according to Gartner – is Microsoft Intune.
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). It allows you control how the devices in your organization are used, whether they’re organization-owned devices that you want full control over, or personal devices under a bring-your-own-device (BYOD) policy where just access to business applications are controlled.
But security doesn’t stop there. Leveraging your certificate authority to manage Intune devices provides secure enrollment and ensures no tampering occurs at any point in the certificate issuance. The combination of Entrust PKI and Certificate Enrollment Gateway (CEG) with Microsoft Intune does exactly this, by allowing customers to leverage PKI seamlessly with their enterprise IT management platform.
The Certificate Enrollment Gateway provides a modular enrollment service, that when coupled with flexible and extensible PKIs, allow devices of any kind to be enrolled securely with extended key and certificate parameters to support advanced identification, authentication, and authorization schemes. CEG also supports automatic and seamless revocation via Intune.
And with our latest PKI offering, cloud-based PKI as a Service (PKIaaS), you also reap the benefits of a solution that is quick to deploy (in minutes!), scales on demand, provides simplicity via managed components and an easy-to-use interface, all backed by the security you expect from Entrust.
For more information on the Entrust PKI and Intune Integration, read our datasheet.
For more on PKIaaS and CEG, visit our PKIaaS webpage.
*** This is a Security Bloggers Network syndicated blog from Entrust Blog authored by Samantha Mabey. Read the original post at: https://www.entrust.com/blog/2021/08/simplifying-device-management-in-a-remote-world/