A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices.
Which of the following solutions would BEST support the policy?
A . Mobile device management
B . Full-device encryption
C . Remote wipe
D . Biometrics
Answer: A