Regardless if you call it the consumerization of IT or the bring your own device (BYOD) movement, the trend of people using their own mobile devices to access corporate resources is unstoppable. Let's be honest -- users are controlling the IT security agenda, like it or not. They love their devices and the apps on them, and they want to use them at work. Clearly, vendors and enterprises alike have recognized this is more than a fad and are fueling the secondary driving force behind BYOD: the potential to make and/or save money by capitalizing on the movement.
Protecting the organization's network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
Read the full article at Network World (IDG) (US) to get my take on what end-to-end secure mobility requirements must be met.