Planning Considerations for BYOD and Consumerization of IT (Part 5)

by Deb Shinder
Sept. 1, 2017 0 comments TechGenix mobile & wireless security

In the first part of this series on planning considerations for security BYOD and consumerization of IT, we looked at the Bring Your Own Device (BYOD) problem domain and discussed key aspects of planning and design. We finished up the article by looking at the structure of a planning frame work that you can use to guide your planning decisions. In Part 2, we discussed a collection of solution requirements that cuts across all secure BYOD deployments. This encompasses the technical capabilities that are required in all BYOD solutions. In Part 3, we continued our coverage of the BYOD requirements and the history and intent behind them. In Part 4, offered some thoughts about the need for your BYOD strategy to support modern authentication mechanisms.