{"version":"1.0","provider_name":"Softeng","provider_url":"https:\/\/www.softeng.es\/en\/","author_name":"Daniel Navarro","author_url":"https:\/\/www.softeng.es\/en\/blog\/author\/danielnliftingroup-com\/","title":"Controlling devices accessing your enterprise with Office 365 - Softeng","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"eAg46PbhtU\"><a href=\"https:\/\/www.softeng.es\/en\/blog\/controlling-devices-accessing-your-enterprise-with-office-365\/\">Controlling devices accessing your enterprise with Office 365<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.softeng.es\/en\/blog\/controlling-devices-accessing-your-enterprise-with-office-365\/embed\/#?secret=eAg46PbhtU\" width=\"600\" height=\"338\" title=\"&#8220;Controlling devices accessing your enterprise with Office 365&#8221; &#8212; Softeng\" data-secret=\"eAg46PbhtU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.softeng.es\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"[vc_row][vc_column][vc_wp_text el_class=&#8217;section-post-default&#8217;] An increasing number of employees accessing sensitive company information through mobile devices is higher. This new trend, compounded by the fact that many users want to work with their personal devices (Bring Your Own Device or BYOD), represents a significant threat to the security of company data. Therefore having a system that controls [&hellip;]","thumbnail_url":"https:\/\/softeng.blob.core.windows.net\/softengpublish\/invar\/c8526050-833c-4897-91be-dc849e62ba90"}