Architect’s Guide: BYOD Security Using TCG Technology
Bring your own device (BYOD) is a rapidly evolving challenge to corporate and information technology (IT) cultures. Instead of having all computing devices supplied by the employer, employees are eager to bring their own smartphones, tablets, and laptops into the work environment.
Unlike many changes in the corporate environment, employees have embraced BYOD and are excited about using their own devices for work and enjoying increased empowerment, agility, mobility, and simple convenience. An effective BYOD program can be a source of increased employee satisfaction and productivity. However, dealing with security and establishing trust in such devices must be the foundation of the BYOD program. Otherwise, sensitive corporate data may be exposed to and even stored on thousands of user-owned devices with inadequate controls, leading to an increase in data breaches.