1. Application Management
    1. Administrators may specify the applications that users may install on mobile devices, using either a blacklist or whitelist approach.
    2. This allows administrators to manage many devices simultaneously, without having to configure each one individually.
  2. Geofencing
    1. Geofencing allows organizations to draw a virtual fence around a geographic area and generate alerts when a device leaves that defined fence.
  3. Authentication
    1. Passwords and PINs
      1. Passwords are stronger than PINs
      2. Both iOS and Android allow the configuration of an alphanumeric password.
      3. Passwords are difficult to enter on a mobile device.
    2. Biometrics
      1. Biometric authentication (fingerprinting) is available on both iOS and Android mobile devices; however, it currently creates too many false positives to be considered reliable.
    3. Context-Aware Authentication
  4. Find, Lock, or Erase a Device
    1. To locate, lock, or remote wipe a device, you must create an account with the service and link that service to your device. Then, go to the following sites:
      1. Apple:
        1. https://www.apple.com/icloud/find-my-iphone/
      2. Android:
        1. https://www.google.com/android/find
    2. You can only use these features if the device is connected to a network.
  5. Containerization
    1. A specialized Mobile Device Management technique that facilitates the simultaneous use of devices for personal and business purposes without activity on one side putting information on the other side at risk.
    2. Containerization provides a secure encrypted portion of the device for business use.
    3. The container runs inside of a mobile app. The information inside the container cannot be accessed by other apps running on the device. The apps inside the container can't access the rest of the device.
    4. Containerization and storage segmentation technologies may be combined with content management controls that prevent the use of sensitive information outside of the controlled environment.
  6. Storage Segmentation
    1. Allocating portions for business use, personal use, and the storage of sensitive information.
    2. Segments may have different levels of encryption and different access controls.
  7. Full Device Encryption
    1. Both Apple and Android devices now automatically encrypt the contents of devices when you enable password protection.
    2. This feature became the default on Android devices beginning with Gingerbread OS and on Apple devices beginning with iOS 8