In this era of mobility and cloud computing, enterprises and individuals are increasingly concerned about the security and protection of their physical environment. Correctly implemented, secure mobile access has the potential to change how we interact and remains a critical front line of defense for enterprises.