Security restrictions, Enterprise mobility management, Enterprise Security Architecture