8. Pro tips
• Never allow unmanaged devices in the
corporate sensitive network zone
• Create a parallel infrastructure for
unmanaged devices
• Sandbox and whitelist where applicable
• Use/create risk and authentication
matrixes
• Blind faith in reputable brands is… blind.