Protection options
There are multiple options available to provide appropriate security controls for BYOD scenarios. The best way to explain these options is to take a layered approach; you can then identify which combination of options is required for your specific business requirements, technical capabilities, and end user scenarios.
The following topics will be covered in this section, specifically those related to BYOD and CYOD scenarios:
- Identity and access management
- Device configuration
- Application management
- Information protection
Identity and access management
In a scenario where the device is joined to the company's AD domain and managed by Group Policy and Configuration Manager, identity and access management is generally controlled by AD. However, in a BYOD scenario, the device may spend more time off the network, and the end user may not want the restrictive policies that may be applied in such a way.
Ultimately, if a user's device is not joined to the AD domain, then they lose certain...