For an enterprise implementing a bring your own device (BYOD) program, which of the following would provide the BEST security of corporate data residing on unsecured mobile devices?
A . Acceptable use policy
B . Device certification process
C . Containerization solution
D . Data loss prevention (DLP)
Answer: D