Five Steps To A Successful BYOD Security Strategy
sponsored by Symantec Corporation
The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data.
How can an organization ensure only approved devices are allowed on the network? Which processes can best manage where sensitive data resides? What tactics work when educating employees?
In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures, and employee education.
(THIS RESOURCE IS NO LONGER AVAILABLE.)