When thinking about Bring Your Own Device, IT executives may tend to focus primarily on securing the company data within the mobile device management software container. However, much of the complexity and risk of BYOD lies in the data found outside the container.