BYOD is a user-driven movement, not a secure mobile device strategy

06.07.2012

- Manage authentication to the devices to ensure the device is being used by its intended owner.

- Ensure devices comply with defined policies (corporate/regulatory) -- validating items such as the device's unique International Mobile Equipment Identity (IMEI) number, expected OS version, rooted or jailbroken status, and specific applications installed or missing.

- Quarantine and remediate policy exceptions.

- Develop applications for the highest level of assessment and control, leveraging (near-)native OS application development methods as opposed to abstraction-based platforms.

- Manage devices once connected (using MDM tools) and the applications that run on them (using MAM).