No middle ground for BYOD

10 June 2013 by Steve Blum
, ,

There’s a variety of methods IT departments use to manage bring-your-own-device (BYOD) users. It ranges from limiting access to the internal network – no different, say, than accessing your business email from home – to putting managed apps on devices to installing a ring-fenced operating environment. SAP, for example, provides companies with a way of creating a sealed-off area on consumer-grade phones.

sliderule

Fully compliant BYOD.

Limiting access isn’t intrusive, but it greatly limits the company resources an employee can access with his or her phone.… More