Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail—all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more—the list of personal devices attempting access to employer networks seems to grow every day in what’s come to be known as the BYOD (Bring Your Own Device) era in networking.