Security group raises BYOD concerns

The top technologies identified to mitigate risks include encryption, the use of virtual private networks, and remote lock and wipe functionality.

Image source: Article
But, who wants to setup an additional VPN for mobile devices?

GOOD technology offers mobile device management and secure application containers without poking holes in the DMZ.

What is your CU's BYOU strategy to mitigate risk?