[SOUND] I might interject. >> Lei said, I have no idea. >> [INAUDIBLE] Good stuff. >> It's going to be live. [LAUGH] [SOUND] >> In regard to mobility, where does cybersecurity fit in? What are some of the challenges for companies and where does IoT fit in all of this as well? >> In terms of security, I think end users are really concerned with BYOD about their personal data getting out, if they're using their device in a corporate sense as well. But the MDMs are really sophisticated now in terms of what they can offer for protection. So, the terms and agreements are really defined, the end users usually know what they're accepting whenever the solution's being put on their device. But from a corporate standpoint, the security is a bit of a different concern, because they're worried about the devices getting into the hands of people who don't work for the organization, and having their corporate secrets let out, in terms of what they might be innovating, for instance. So, obviously everything's over SSL. And regardless of the MDM vendor that you use, if you're using an iOS device, for instance, and Apple requires a lot of the communications to be over a GDPS to try to increase security in that sense. So, if you're an MDM provider, then you'd have to abide by Apple's rules if you're going to be managing Apple's devices. >> Yeah, and a lot of the security aspects, there's different parties to really consider. You've got, on the OS level, you've got Android and iOS and they provide the functionality, the types of security kind of aspects that an MDM solution would use to actually implement those security features. So, on one sense, you gotta do what the OS will allow you to do. And on the other sense, you've got the MDM provider that will have to implement that for the enterprise. One thing that I would say is that in the past, if you show up day one at your job, then they're probably going to provision you a machine that the corporation has blocked down. They really got that thing under their control. But now with BYOD, you show up and it's just this device that no one knows about, and it's wanting to connect to the system. And so, the challenge is how can we do that, how can we provision this device not knowing what its past was, not knowing who potentially has it, who's the owner. So, it's really a challenge in that regard that you've got these unknown entities showing up that you're going to say, I'm going to let you connect to this system. I'm going to let you access these resources in the enterprise. >> Mm-hm. >> In regards to IoT, wearables are obviously a big thing now, and a lot of the wearables are like Apple watches, Android watches, sporting goods. And they're all connected to the same type of operating systems that are on mobile devices. And a lot of the times, when companies are controlling or managing the mobile devices, they're more so saying that I support the ability to manage this particular type of operating system. So if that type of operating system is in a wearable, for instance, then the corporation is probably going to be able to manage that as well, if they want to. So, it's not necessarily as clear what they would want to manage necessarily a wearable for, but you can imagine certain corporations that are in the Internet. Or doing things with car innovation, they might want to control the operating system, similar to how mobile device management companies do the mobile devices. So, they might want to control the car, for instance, and be able to send policies and updates, which I am sure there are things that are like that, but the line may be more blurred in terms of it could come really similar to how mobile devices are being managed as well. >> And I would say that aside from different connected devices, what we really see is that the mobile device is kind of at the center of all these connected devices. The mobile device is going to be talking to these other things, talking to your car, or talking to your refrigerator, or your watch. And so, if you've got corporate data sitting on that device, you really got to have it locked down, so these other devices can't get at that data. So, that's really, it's really going to be challenging going forward with all of these different connections happening where data could start flowing in places that it doesn't need to be. >> Yeah, do you think folks even know just what's at stake? I mean the paranoid me would say, well, okay, if the company has some kind of software installed on the phone, they can monitor what I do. Totally understood, they paid for it. But with IoT, I've got, let's say, one of these little things that you put on your wrist, or let's say, something in the fridge is out. So, all of a sudden now, don't they have the capacity to know, hey, look my blood pressure is up or something, or I'm out of cranberry apple juice in the refrigerator. >> And maybe they don't like a guy who drinks cranberry apple juice. So, I mean maybe that's what you're talking about when you talk about blurring the line. And I think there's definitely some implications for just how you live your life in a general sense. >> Right. And with the containers that I mentioned earlier, it kind of provides some separation, so that the end user does not have to be in a paranoid mindset like, I'm watching Netflix for ten hours, my corporation might not appreciate that. But there are the containers now. And even when there's not the containers, whenever it's a payload, for instance, that would get installed on your device with, it would have everything that it's installing. So it might say, I'm restricting your camera because this is a corporate device. You don't need to take pictures, and I'm also preventing you from downloading things from iTunes, and I'm sending you emails. So, the user, I guess, if they're savvy enough to care about reading what's going in there, they're able to see. And if they don't like it, then they don't necessarily have to click install, unless the corporation is provisioning those devices for the users, and they're giving it to them in that sense. In that case, it's not the personal device any longer. >> And also, to just add that there's a lot of responsibility for device OS-makers like Apple and Android to really kind of provide the functionality for all of the things that we want to do on the devices. And they are aware of it. They're trying to cater to the corporations that want to manage these devices, and there's a lot of weight that they put in the users kind of corner because the users are paramount, because they're the ones that calls the devices to get out into the world. But Apple and Google and others Microsoft with Windows phone, they're catering to the businesses. They see there's a market for BYOD, and so, they're putting in these features that will allow kind of these simultaneous users on the device, whether it's the corporation and the actual user. So. >> Great. [SOUND]