Q: 1
To save on device life-cycle costs, a company is transitioning to a BYOD deployment scheme for
enterprise mobility. Local laws protect users from corporate-initiated wiping or manipulation of data
not owned by the company. Which of the following techniques would best protect corporate data
while ensuring the integrity of private data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.