TECHTALK: BYOD? Advantages and Security Challenges

Cooperatives are finding that workers/contractors want to use their own personal devices to receive/report on work orders. They’ve also discovered the practicalities –  from increased productivity and fast technology adoption, to savings from not distributing hardware/devices. A successful bring-your-own-device program includes end point security, geospatial data, controls in the field, penetration testing, and open ports in firewalls. We’ll look at the entire connected process, and the security issues you need to be aware of.


  • Geoff Glave – Senior Product Manager – Clevest