A company has recently decided to allow employees to access corporate email and applications on their personal smartphones. The IT department is tasked to ensure that corporate data is secure on these devices without completely restricting personal use. Which of the following MDM deployment models should be utilized?
Choose your own device (CYOD)
Corporate-owned, business-only (COBO)
Bring your own device (BYOD)
Corporate-owned, personally enabled (COPE)
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts