Tag: Mobile Mentor
Mobile Mentor and Zero Trust: a modern workplace methodology
The biggest challenge for organisations today revolves around avoiding a data breach. Recent events in Australia - Optus, the second largest telecommunications company in the country, had identifying details of up to 9.8 million customers stolen from their database - only serve to highlight the importance of protecting your customer data.
6 transformations to disrupt your legacy IT operations
Mobile Mentor rounds out their Zero Trust series with a summary of "Six pillars of Modern Endpoint Management" and a link to download the full whitepaper. It highlights why we can't continue with legacy IT operations and how disrupting the status quo will have your IT team thanking you.
Zero Trust – At Scale
Zero Trust can be implemented with E3 but it can only be scaled effectively, with a high degree of automation, using E5. Mobile Mentor outlines the main security enhancements to a Zero Trust architecture, at scale, using Microsoft 365 E5 licenses.
Getting started with Zero Trust
Legacy security based on a network perimeter, or a castle and moat approach, is no longer fit for purpose. Mobile Mentor outlines how a zero trust architecture can be deployed using Microsoft 365 E3 licences in this second article in the Zero Trust series.
The underlying principles of Zero Trust
Mobile Mentor is a global leader in the endpoint ecosystem and Microsoft’s 2021 Partner of the Year. Certified by Microsoft, Apple and Google, their engineers live and breathe endpoint security and work tirelessly with clients to balance endpoint security with an empowering employee experience.
Mobile Mentor’s award-winning Zero-touch provisioning
Mobile Mentor beat out dozens of entries from around the world to win the end-point management category at last year's Microsoft Partner Awards.
Is Cybersecurity a top 3 item for you?
There is no question that the cybersecurity landscape is shifting rapidly and, in turn, cyber criminals are becoming more sophisticated. Incidents such as the recent breach at Waikato DHB point to the evidence of real-world consequences for organisations with dated vulnerabilities in their security infrastructure.
Hacking Apple, Dogs using Virtual Reality, NZ Government vs Encryption
A discussion of the tech news of the week with Paul Spain and Denis O’Shea (Mobile Mentor).