What do IT departments use to ensure that all devices in a BYOD environment are secure?
A. Virtual Private Networks
B. Public key infrastructure
C. single sign-on authentication
D. policy management
What do IT departments use to ensure that all devices in a BYOD environment are secure?
A. Virtual Private Networks
B. Public key infrastructure
C. single sign-on authentication
D. policy management