Managing BYOD endpoint security

Last updated:June 2014

Security School

Browse Sections
  • Five steps to a successful BYOD security strategy

Editor's note

Security School logo Mobility has rendered the network perimeter moot. Laptops, smartphones and tablets extend the enterprise to new limits, taking data and applications to those same new limits. In the meantime, securing those devices and data becomes a much more difficult proposition, not only because of geography but also because of the multitude of platforms that must be supported. This Security School lesson will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.

 

SearchCloudSecurity
SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close