| http://www.w3.org/ns/prov#value | - But if IT security managers want to place controls on the user device to separate out and manage corporate e-mail, applications and data, it is possible to enforce security such as authentication, encryption, data leakage, cut-and-paste restrictions and selective content wiping through various types of container technologies.
|