BYOD programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops.
This whitepaper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
SOURCE: net-security.org
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.