No middle ground for BYOD
There’s a variety of methods IT departments use to manage bring-your-own-device (BYOD) users. It ranges from limiting access to the internal network – no different, say, than accessing your business email from home – to putting managed apps on devices to installing a ring-fenced operating environment. SAP, for example, provides companies with a way of creating a sealed-off area on consumer-grade phones.
Fully compliant BYOD.
Limiting access isn’t intrusive, but it greatly limits the company resources an employee can access with his or her phone.… More