The paper discusses BYOD aspects: Pros and cons, an overview of all kinds, the apps problem, potential attack vectors on BYOD and data leakage through, advice and implementing a device management model. Integrating Mobile Device Management (MDM) inside corporate IT management protocols is a must.
- CA
- For Business
- Resource Center
- White Papers
- BYOD: (B)rought (Y)our (O)wn (D)estruction?