Every IT strategy involves questions of data access: who accesses what, for how long and what can they do with it. With bring your own device (BYOD) , those questions become more persistent and complicated. Questions of data security and network security become forefront.
Enterasys recently posted about the importance of visibility and security noting that those involved in IT security need to ask in order to determine if user access is within acceptable compliance and security policy levels:
Your control solution should automatically enforce these rules. Check out how Absolute Manage can help.