Securing Employee-Owned Devices
Most enterprises are dealing with the proliferation of EODs in organization, in different ways. Some ban them but a growing number of companies recognize the undeniable productivity benefits of allowing them. That leaves the big question - how to secure them. One approach is to secure the data by encryption, as mentioned in a recent post on this blog. But this isn't always possible either.
Monitoring is a key approach for many companies. They establish a system for identiying the devices that are connecting and then have a system for monitoring them. This allows a degree of flexibility that can help find an optimum level of productivity for the users. This article has more.