The document discusses considerations around implementing a bring your own device (BYOD) infrastructure. It outlines potential pros, including increased productivity, fostered innovation, and cost savings. It also addresses potential cons like security threats and increased costs. The document concludes that an organization should implement a BYOD infrastructure to tighten security controls, optimize costs, increase employee productivity, foster innovation, and implement a pioneering strategy. Key enablers of a BYOD infrastructure include mobile device management systems, virtual desktop infrastructure, and dual-persona devices.