BYOD(evice) without BYOI(nsecurity)

  • Tuesday, February 28, 2012 | 2:40 PM – 3:30 PM | Room: Room 132

View all Sessions

The session presents the real life drama of running a BYOPC program without neutering security. As your workforce transitions to a mobile workforce, how do you meet the imperative while providing a reasonable security posture? A Fortune 100 company shares its on-the-ground experience implementing secure Bring Your Own PC and mobile computing programs.


This document was retrieved from on Fri, 20 Oct 2017 10:25:31 -0400.
© 2017 EMC Corporation. All rights reserved.