An Analysis of BYOD Architectures in Relation to Mitigating Security Risks

An Analysis of BYOD Architectures in Relation to Mitigating Security Risks
Author :
Publisher :
Total Pages : 96
Release :
ISBN-10 : OCLC:1024316258
ISBN-13 :
Rating : 4/5 (58 Downloads)

Book Synopsis An Analysis of BYOD Architectures in Relation to Mitigating Security Risks by : Nitsuh Asfaw Tesfaye

Download or read book An Analysis of BYOD Architectures in Relation to Mitigating Security Risks written by Nitsuh Asfaw Tesfaye and published by . This book was released on 2017 with total page 96 pages. Available in PDF, EPUB and Kindle. Book excerpt: As the adaptation of smartphones and tablets to conduct business activities increases, enterprise mobility becomes a rising trend in business environments providing a flexible work environment that modernizes how workers accomplish their tasks. One significant part of the current enterprise mobility movement is the adoption of the Bring Your Own Device (BYOD) strategy. BYOD allows employees to use their personal mobile devices to access corporate resources and conduct business tasks while maintaining the usage of these devices for personal activities. This underlying feature of the BYOD solution presents serious concerns for enterprises in terms of securing the storage and access of the corporate data. This report will explore the BYOD strategy and analyze the business requirements that are tied to the secure storage and management of corporate data. The report will also study existing architectural approaches as they relate to the BYOD movement, and explore how these approaches attempt to minimize the security risks and challenges associated with the BYOD strategy.


An Analysis of BYOD Architectures in Relation to Mitigating Security Risks Related Books

An Analysis of BYOD Architectures in Relation to Mitigating Security Risks
Language: en
Pages: 96
Authors: Nitsuh Asfaw Tesfaye
Categories:
Type: BOOK - Published: 2017 - Publisher:

DOWNLOAD EBOOK

As the adaptation of smartphones and tablets to conduct business activities increases, enterprise mobility becomes a rising trend in business environments provi
Enterprise Cybersecurity
Language: en
Pages: 508
Authors: Scott Donaldson
Categories: Computers
Type: BOOK - Published: 2015-05-23 - Publisher: Apress

DOWNLOAD EBOOK

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of m
Proceedings of the Australasian Computer Science Week Multiconference
Language: en
Pages: 367
Authors:
Categories:
Type: BOOK - Published: 2020 - Publisher:

DOWNLOAD EBOOK

BYOD for Healthcare
Language: en
Pages: 450
Authors: Jessica Keyes
Categories: Medical
Type: BOOK - Published: 2014-04-23 - Publisher: CRC Press

DOWNLOAD EBOOK

With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, i
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
Language: en
Pages: 1177
Authors: James Michael Stewart
Categories: Computers
Type: BOOK - Published: 2015-09-11 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

NOTE: The exam this book covered, CISSP: Certified Information Systems Security Professional, was retired by (ISC)2® in 2018 and is no longer offered. For cove