Firms must maximize their remote workers’ productivity without exposing them or their devices to new risks. This is complicated by personally-owned devices, over which the IT security team has little oversight. IT management and security teams must collaborate to provide visibility and control over all devices that access enterprise data. Both teams will also need to build competence deploying and managing the technologies needed for remote work across managed and unmanaged devices. This report provides best practices to help security and risk (S&R) leaders identify the tools that are best positioned to support — and secure — your remote workforce and the endpoints they use.