As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of
security in place to enable users to be productive no matter where they are. This model is also called BYOD (Bring Your Own Device) and there are many elements on this model that must be addressed before you enable users to access corporate information from
their own devices.
This survival guide is based on Microsoft Technologies that will assist you to enable your BYOD strategy and ensure that company policies are in place to secure data access and device management. If you need a vendor agnostic guideline on how to manage security
of mobile devices in the Enterprise, refer to NIST (National Institute of Standards and Technology) publication 800-124 Revision 1 that has the guidelines