Cracking the BYOD Security Nut

While so-called BYOD isn’t necessarily new — IT departments, after all, have been supporting mobile road warriors since the 1980s — the rising tide of end users seeking the use and support of their own consumer devices is something quite different. It’s so different that IT departments are grasping for any standard or proven approaches that make Bring Your Own Device access of enterprise resources both secure and reliable. The task is dauntingly complex, and new and unforeseen consequences of BYOD are cropping up regularly.

Continued here:
Cracking the BYOD Security Nut


Tags: , , , , , , , , , , , , , , , , , ,

Leave a Reply

You must be logged in to post a comment.