Read this report to get an in-depth look at how the new security architecture is set up and what enterprises can do to implement it on employee devices now.