When organizations adopt cloud and allow employees to work from mobile devices, they need to begin securing their data in new ways. As corporate information flows to different types of endpoints, different types of tools are needed in order to protect it. It is time for the modern enterprise to evolve and make use of separate security solutions for managed and unmanaged devices – the two can no longer be treated in the same fashion.