A company is creating a security policy that will protect all corporate mobile devices:
• All mobile devices must be automatically locked after a predefined time period.
• Some mobile devices will be used by the remote sales teams, so the location of each device needs to be traceable.
• All of the user's information should be completely separated from company data.
Which of the following would be the BEST way to establish these security policy rules?
1) Containerization
2) Biometrics
3) COPE
4) VDI
5) Geofencing
6) MDM