Mdm systems must be able to locate a lost or stolen phone , lock it automatically and wipe the contents if there is evidence of an attempt at hacking all without the intervention of the user .
The key , according to many experts , is mobile device management ( mdm ) , software running both on the operator 's servers and embedded in the customer 's phone which , remotely and over the air , can track and control the phone 's performance .