10 Mobile Security, BYOD Privacy And Security Myths


Email this CRN article

1. User Privacy Is Invaded By BYOD Management

When employees become conscious of mobile device management (MDM) features, such as requiring a PIN code or a remote wipe capabilities, at all times, it may call into question how much IT is monitoring the device. However, Bluebox believes the right implementations don't cross the privacy line; they don't track activity on the device nor do they read personal data, and that should be communicated to end users.



Email this CRN article