byEdward J. Correia on
The Trust Model
Early in the development of a BYOD strategy, questions will arise surrounding which users will be trusted with which data and/or resources and in which circumstances. The issues become more complex when personal mobile devices are involved because such devices are often not in the organization's direct control. For example, a trusted user carrying sensitive documents on an iPad might unknowingly disable company-mandated encryption, exposing the company in the event of loss or theft. Companies will often seek a tiered approach to this problem, and commercial products from ForeScout, Good and MobileIron offer excellent, channel-friendly solutions.
Get CRN Headlines Delivered with Our Fresh Newsletter Lineup
For solution providers just getting into the IoT arena and those already building their business around the technology, CRN presents the 2018 Internet Of Things 50.