Remove Blog Remove Security Remove User Experience
article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

If you are joining us for the first time, I encourage you to check out the first blog for a quick rundown of our scenario. In the first blog, we outlined a scenario where our user Megan B. PII: Social Security Numbers) or custom expressions. End-user experience. Attempting to Print: User Experience.

How To 520
article thumbnail

Four Microsoft 365 Network Connectivity Principles You Need to Know (Part 3 of 4)

Perficient

Welcome back to part 3 of the “Four Microsoft 365 network connectivity principles you need to know” blog series! In addition to the local egress that we discussed in the last blog, this principle calls for direct connectivity specifically for Microsoft 365 connections. More on that in the next blog!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Controlling End-Users using Sensitive Data on Unmanaged Devices. Let’s say we have a user, Megan B. End-user experience.

Data 520
article thumbnail

Four Microsoft 365 Network Connectivity Principles You Need to Know (Part 4 of 4)

Perficient

Welcome back to the last part of our “Four Microsoft 365 network connectivity principles you need to know” blog series! If you haven’t had a chance to check that blog post out yet, I encourage you to check it out here. Principle #4: Modernize Security for SaaS.

article thumbnail

Mastercard On Why It Supports EMV Secure Remote Commerce Specification

PYMNTS

Mastercard, the digital payments company, made the case in a blog post Monday (Oct. 22) on why it supports EMVCo’s release of the EMV Secure Remote Commerce Specification draft , which is now available for public review and comment. The finalized version 1.0 “The future that we all envision is right in front of us. .

Security 136
article thumbnail

Wearable devices and the future of authentication

Celent Banking

However, I believe that there is a great opportunity for certain wearable devices to provide strong authentication and enhance the user experience ( see this blog entry ). Corporate Banking Retail Banking authentication Mobile Security wearables' This potential, particularly for banking is still to be determined.

article thumbnail

Four Microsoft 365 network connectivity principles you need to know! (Part 1 of 4)

Perficient

Luckily, Microsoft makes your job that much easier by providing four straightforward principles that you should follow to ensure the best end-user experience across all Microsoft 365 services. Modernize Security for SaaS (Software as a Service). Tune in soon for the next blog on our second principle, enabling local egress!