5 Factors Of A Successful BYOD Strategy


The Trust Model

Early in the development of a BYOD strategy, questions will arise surrounding which users will be trusted with which data and/or resources and in which circumstances. The issues become more complex when personal mobile devices are involved because such devices are often not in the organization's direct control. For example, a trusted user carrying sensitive documents on an iPad might unknowingly disable company-mandated encryption, exposing the company in the event of loss or theft. Companies will often seek a tiered approach to this problem, and commercial products from ForeScout, Good and MobileIron offer excellent, channel-friendly solutions.