BYOD(evice) without BYOI(nsecurity)

  • Tuesday, February 28, 2012 | 2:40 PM – 3:30 PM | Room: Room 132
View all Sessions

The session presents the real life drama of running a BYOPC program without neutering security. As your workforce transitions to a mobile workforce, how do you meet the imperative while providing a reasonable security posture? A Fortune 100 company shares its on-the-ground experience implementing secure Bring Your Own PC and mobile computing programs.


This document was retrieved from on Fri, 24 Oct 2014 14:44:29 -0400.
© 2014 EMC Corporation. All rights reserved.