BYOD(evice) without BYOI(nsecurity)

  • Tuesday, February 28, 2012 | 2:40 PM – 3:30 PM | Room: Room 132

View all Sessions

The session presents the real life drama of running a BYOPC program without neutering security. As your workforce transitions to a mobile workforce, how do you meet the imperative while providing a reasonable security posture? A Fortune 100 company shares its on-the-ground experience implementing secure Bring Your Own PC and mobile computing programs.


This document was retrieved from on Wed, 25 Nov 2015 19:55:35 -0500.
© 2015 EMC Corporation. All rights reserved.