Companies have finally figured out how to let workers use their own devices to be productive (while ensuring that corporate data remains protected). Credit MDM, EMM, MAM and UEM.