Android Devices in a BYOD Environment

November 7th, 2013 |
Image for FaceBook
Download PDFRead/Download White Paper (PDF)
 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
This pdf file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the pdf file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google Android-based devices add a level of complexity because we manage more than 20,000 devices encompassing over 800 combinations of Android OS versions and hardware.

Intel IT manages Android devices in the enterprise with a complex security evaluation process that is applied to every personal device an employee wants to use for work purposes. Forensic evaluations on employees’ devices are done only when required for an active investigation or legal matter. Respecting employee privacy is a priority across the entire lifecycle—from device onboarding and provisioning, to how data is managed and retained, including how we respond to an eDiscovery request.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , , ,
 
Posted in: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security