This document discusses the challenges of Bring Your Own Device (BYOD) programs for corporate networks. It notes that BYOD is being driven by employees and consumerism, but can overwhelm network infrastructure and security if not properly managed. The document recommends using mobile device management (MDM) and mobile application management (MAM) to implement policies for passwords, encryption, remote wiping of lost devices, and VPN access. It also suggests controlling applications, websites, and malware/viruses to secure data across wired and wireless networks through a unified threat management (UTM) firewall that applies security policies consistently to all devices.