Protecting content
As we've progressed through this book, we have demonstrated how critical it is to ensure that we can provide the required security controls to protect the corporate information being provided to the users' devices. The same applies to MCM and EFSS as you deploy these initiatives into your organization. Since we are expanding the user's ability to access content repositories, we need to ensure that we are able to control access to that content as well as data at rest and in transit. When we start looking at content, this could be anything from files, spreadsheets, videos, pictures and so on that will contain all kinds of information about your organization. Allowing any of this information to leave the control of your organization could create significant penalties and build a negative image for your company.
As we discussed in Chapter 7, Mobile E-mail Management, there will most likely be policies and regulations in place that enforce what a user should and shouldn't do...