There are multiple options available to provide appropriate security controls for BYOD scenarios. The best way to explain these options is to take a layered approach; you can then identify which combination of options is required for your specific business requirements, technical capabilities, and end user scenarios.
The following topics will be covered in this section, specifically those related to BYOD and CYOD scenarios:
- Identity and access management
- Device configuration
- Application management
- Information protection