Watch this video on YouTube
An engineer is concerned about the security of mobile devices in the organization which have been given access to corporate resources. What can this engineer implement to manage and maintain the devices?