How to Build a Solid BYO Policy and Mitigate Security Risks
Feb 12 2015

DATE
Feb 12, 2015

How to Build a Solid BYO Policy and Mitigate Security Risks

Minimizing the security risks associated with BYO requires a synergistic combination of policies, procedures based on those policies, and technology. For many organizations, this requires annual review of BYO policies based on evolving business needs and what users are actually doing. Get an in-depth look at how establishing the right BYO policy gives IT control of business information and mitigate business risk.

In this session, we will discuss:

  • Five case studies that highlight BYO legal and policy challenges
  • Best practices for setting optimal BYO policies
  • How Citrix technology can mitigate BYO risk