Enterprise security has never been more important or complex than it is today. Mobile devices, new client technologies, and cloud-based services are just some of the recent additions. Handling JAX-RS endpoints, spotty connectivity, local storage support, constrained devices and other land mines can be more than just a challenge. These also seem to be among the first areas glossed over by most projects. Why? Because dealing with them is hard!