Roger Grimes: BYOD will require a different security framework than traditional computing. The framework is intended to help companies assess the relative risks of BYOD hardware and the level of access they should have to different types of data. It’s my hope that this framework will (at least partially) satisfy the “never say manage” BYOD believers, as well as folks like me who believe managed devices will always play a role. At Microsoft, we consider the device and its security, session origination location, identity/authentication, and the data/service/application being accessed.”]
Source: https://www.csoonline.com/article/2617762/how-to-have-byod-and-security–too.html

