8. where to secure the risk? device data 10111001100010111111010111 enterprise
9. Securing the device passcodes/passwords remote wipe hardware based encryption policies device type, configuration restrictions
10. securing the data? information protection and control non-public information personally identifiable information intellectual property identity aware data loss prevention
12. securing the enterprise device authenticity is crucial device dna strong authentication two factor authentication different needs for different usercommunities client virtualisation greater control