There was a time, seemingly not so long ago, where business cell phones had clunky keyboards, terrible screens, and limited every-day functionality outside of making calls and checking emails. The introduction of the iPhone in 2007 changed all of that, combining not only the abilities listed above but also a music player to drown out the cubicle noise in the office, simple games to keep a person distracted from actual productivity, and a decent digital camera which enabled users to fill their storage with photos of their food, children, grandchildren, and pets. While these new features were great for the average consumer and led to an increased adoption of smart phones, they created an additional headache for businesses with regard to balancing device security and user data on small, easily lost, and often personally-owned devices. Users began wanting access to their business email on these smart phones yet still have control over the devices themselves. This issue persists to this day, on phones as well as tablets, and it is imperative that controls are in place to ensure company data is kept safe.