A great deal has already been written on this subject, usually from management and cost perspectives. It is approached from a security angle far less often: ‘how do we adequately secure our assets when we introduce Bring Your Own Device (BYOD)?’ This whitepaper primarily examines the security aspects.