This document discusses preparing for "Bring Your Own Device" (BYOD) in corporate IT environments. It notes that corporate IT departments have largely lost the ability to restrict which devices employees use and that there is now a wide variety of devices. The solution is for IT to accept this diversity and focus on securing access to corporate information on different devices rather than trying to manage each device directly. The document recommends taking a risk-based approach and creating a matrix to define how different applications and information can be accessed securely from different device classes through options like secure browsers, virtual desktops, or custom apps. While securing access across many devices is challenging, the document argues it is more feasible than attempting to manage or restrict each individual device type.