Authors: Mike Anderson, Jim Lundy Date: December 4, 2012
Topics: Cloud, Mobile Research Note Number: 2012-41
What risks will cloud computing bring to the firm?
What are the cloud and networking best practices regarding security?
What are the best practices for harnessing the power of mobile computing?
Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile management tools to rein in security for the growth of BYOD.[This Research Note is restricted to Provisor Level Research Clients. To become a client, contact firstname.lastname@example.org]
Copyright © 2012 Aragon Research Inc. and or its affiliates. All rights reserved.