BYOD Security

Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Comments

  • James, why don't you share some of your learning... We are sure the members would love to learn from your experience.

  • We have implemented a BYOD policy in our environment, with the use of Mobile Iron to manage it, and I would be happy to share with you our thoughts going from a company issue BlackBerry environment to a BYOD environment includes IOS, Android, and Windows.

This reply was deleted.

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)