Search

How to manage personal device risk

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Guerra, Domingo</dc:creator>
<dc:date>2017-12-01</dc:date>
<dc:description xml:lang="es">Sumario: In the decade since the iPhone was released in 2007, mobile device adoption has exploded in the workplace. Bringyour own device (BYOD) policies are proliferating at a fas ter rate than the use of corporate-owned devices. Many security teams have moved to control corporate-owned devices with enterprise mobility management programs, and sorne go as far as actually securing these devices with mobile threat defense solutions. For the most part, however, employees' personal devices are left unprotected. </dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/163006.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Gerencia de riesgos</dc:subject>
<dc:type xml:lang="es">Artículos y capítulos</dc:type>
<dc:title xml:lang="es">How to manage personal device risk</dc:title>
<dc:relation xml:lang="es">En: Risk Management Magazine. - New York : Risk and Insurance Management Society, 1982- = ISSN 0035-5593. - 01/12/2017 Volumen 64 Número 11 - diciembre 2017 , p. 8-10</dc:relation>
</rdf:Description>
</rdf:RDF>