Watch this video on YouTube
How can access control to a sensitive intranet application by mobile users be best implemented?