A company has a policy that all data stored on a corporate mobile device must be encrypted.
You need a management solution that enforces the policy.
Which two management solutions should you use? Each correct answer presents part of the solution.
(Choose two.)