Bring your own device
Bring, Pick, Choose, Your Own Device. That sounds very nice for users, but it can quickly become a total nightmare for the management and security organization.
A great deal has already been written on this subject, usually from management and cost perspectives. It is approached from a security angle far less often: ‘how do we adequately secure our assets when we introduce Bring Your Own Device (BYOD)?’ This white paper primarily examines the security aspects.