Star 0

Abstract

Creating a mobile security policy and infrastructure in the Enterprise can be a daunting task. There are many risks associated that go along with management and users pressuring for supporting tablets and smart phones. Mounting pressures to support BYOD only complicates the matter.