Security and risk (S&R) professionals face an ever-expanding number of ways to approach enterprise mobile security; the current and emerging plethora of technologies span the stack from the network layer to the application and data layers. Each technology yields a different employee experience and level of effectiveness, making the evaluation and purchasing process difficult. Security pros must thoroughly understand the product options, their operational use cases, their required investment, and their long-term market viability in order to make an informed purchase decision. This updated TechRadar report defines the use cases, business value, and outlook for the 15 core enterprise mobile security technologies.