The arrival of personal technology in the office is a challenge for all organisations. The technology is here, but not yet adapted for corporate use, and CIOs are asking what security policies must be put in place to safeguard network services and company data are these devices proliferate.
This white paper describes how these devices can be identified on the network, securely enrolled, and authenticated and authorised on the network
Download the whitepaper