by Symantec Corporation
> View this now
Published on: February 12, 2013
Type of content: PODCAST
The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data.
How can an organization ensure only approved devices are allowed on the network? Which processes can best manage where sensitive data resides? What tactics work when educating employees?
In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures, and employee education.