An oft-overlooked aspect of mobile security is the risk introduced by compromised devices. Integration through mobile threat management solutions can now be added to EMM policy management to help identify device risk. Mobile threat management capabilities can detect malware and either report the risk or delete the affected files. When a device is at risk, the data present on it is also at risk. A good mobile security best practice when one of these devices is identified is to automatically wipe enterprise content on the device to prevent data leaks.”]
Source: https://securityintelligence.com/mobile-security-for-unmanaged-devices/