A small company has recently purchased cell phones for manage to use while working outside if the office the company does not currently have a budget for mobile device management and is primarily concerned with determine leaks if sensitive information obtained by unauthorized access to unattended phones which of the following would provide the solution BEST meets company's requirements?