He could maybe therefore be given the option to choose his preferred networkaccessmethod (WiFi, 3G, LTE, WiMAX, ..) or even combine some of theaccess methods in order to provide a bigger pipe.
By enabling a security architecture centered on data control, IT solves longstanding security problems through empowering the environment to protect sensitive data regardless of accessmethod, device, network, ownership or location.