Provided by: NEC Corporation
Bring Your Own Device (BYOD) is attracting considerable attention now-a-days. In BYOD scenarios, enterprises wish to integrate their employees' mobile devices in enterprise operations (e.g., reading emails and editing documents). This clearly raises serious security concerns since the mobile device in question is not under the control of the enterprise and is vulnerable to a wide range of security threats. In this paper, the authors address this problem and propose a solution that enhances the security in the BYOD scenario without compromising the usability, and flexibility of the system.