The impact that mobile devices have had in both the personal and work realm is virtually incalculable and continues to grow and evolve at an astounding rate. The bring-your-own-device (BYOD) phenomenon has taken shape as a result of businesses becoming privy to their employees' preferences for using their own smartphones or tablets to access corporate data and perform their daily tasks. With the massive influx (within this year, 38 percent of companies expect to stop providing devices to workers [1]), there are tremendous challenges in terms of finding an effective BYOD solution that meets company data security needs.