This resource is no longer available
5 Steps to a Successful BYOC Program
In 2012, you will be faced with more people using their own computer for work than ever before. Many highly influential employees are already doing so, and are staying comfortably outside of your control. This creates an unstable situation because you are still on the hook for supporting them, and assuring security, but are being denied access or are not equipped with the right tools for the job. This report by Forrester Research, Inc. provides the guidance you need to establish a framework for managing and supporting employee-owned computers efficiently, while offering as much freedom to workers as possible and ensuring security at the same time.