This resource is no longer available
Mobility has fast become a critical part of an enterprise's networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. Not only is IT now faced with the challenge of supporting numerous devices including laptops, smartphones, and other mobile handhelds, but they also have to support numerous types of hardware and software including various versions of Windows Mobile, RIM Blackberrys, Apple iPhones, Symbian devices, Palm devices and Linux based devices.
Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection that IT must use in order to provide robust security to all its users.