BYOD(evice) without BYOI(nsecurity)

  • Tuesday, February 28, 2012 | 2:40 PM – 3:30 PM | Room: Room 132

View all Sessions

The session presents the real life drama of running a BYOPC program without neutering security. As your workforce transitions to a mobile workforce, how do you meet the imperative while providing a reasonable security posture? A Fortune 100 company shares its on-the-ground experience implementing secure Bring Your Own PC and mobile computing programs.


This document was retrieved from on Sun, 18 Aug 2019 17:18:21 -0400.