"Bring Your Own Device" - It Takes the complexity out of managing multiple devices.
BYOD Security
Bring-your-own-device has evolved from trend to the new normal and with that discussions around the risks of implementing a BYOD policy in the enterprise have become intense. BYOD security policy initiatives may include limiting activities that employees are allowed to perform on these devices at work (e.g. email usage is limited to corporate email accounts only) and periodic IT audits to ensure the device is in compliance with the company's BYOD security policy.In the event that a device is lost, or the employee leaves the businesses, the security team must navigate the potential minefield of ensuring that corporate data on the device is removed while trying to minimize impact to the end user for their own information.
http://whatis.techtarget.com/definition/BYOD-bring-your-own-device
BYOD may change everything about Security
http://www.webopedia.com/TERM/B/BYOD.html
No comments:
Post a Comment