Computing have a good piece summarising the panel I ran at InfoSec 2012 My issue was around the jailbreaking of devices. If a user is motivated and capable of jailbreaking a device what else could they be doing to your network?
The full article is here http://www.computing.co.uk/ctg/news/2170534/infosec-jailbroken-devices-threat-network
We automatically stop accepting comments 180 days after a post is published. If you would like to know more about this subject, please contact us and we'll try to help.