Infrastructure Security Requirements for a hardened back-end infrastructure are magnified by mobile devices which provide attackers with a potential route into your back-end network. Explore infrastructure security and back-end hardening for mobile systems.