Watch this video on YouTube
An information security manager is concerned about the security of portable devices in the organization that have been given access to corporate resources. What can this information security manager implement to manage and maintain the devices?