The top technologies identified to mitigate risks include encryption, the use of virtual private networks, and remote lock and wipe functionality.
But, who wants to setup an additional VPN for mobile devices?
GOOD technology offers mobile device management and secure application containers
without poking holes in the DMZ.
What is your CU's BYOU strategy to mitigate risk?
No comments:
Post a Comment