With today’s mobile-centric computing, user demands have increased and new mobile systems have emerged with deeper functionality and much more diverse usage than ever thought possible. The ways we’re doing business are changing rapidly, yet we’re still narrowly focused on the traditional approach for managing and securing mobile systems: at the device level . One thing is clear—IT is out of the loop when it comes to BYOD . And when IT is out of the loop and mobile devices are not properly managed and secured, significant business risks emerg.