Make BYOD easier with the help of these five apps

TrueCrypt 2

TrueCrypt also supports a concept called plausible deniability. This feature allows a single hidden volume to be created within another volume. Windows users can even create an encrypted, hidden operating system whose existence can be denied. TrueCrypt might be the single best means of hiding your business data on your BYOD.

Credit: Images by Jack Wallen for TechRepublic

About Jack Wallen

Jack Wallen is an award-winning writer for TechRepublic and He’s an avid promoter of open source and the voice of The Android Expert. For more news about Jack Wallen, visit his website

Free Newsletters, In your Inbox