BYOD (Bring Your Own Device) often represents a loss of control for the enterprise in terms of security and it can increase support costs as the IT department has to learn about various tablets, laptops and smartphones. But at the same time it can represent a cost saving. Can mobile devices really be used widely for identity and access management (IAM) and can it be used as a factor in authentication? Joining Wendy Nather in this intellectual debate are Eric Olden from Symplified, Lloyd Burch for NetIQ, and Patrick Harding of Ping Identity.
Topics: Identity & Access Management
Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time