There are many concerns for an enterprise when considering how and when to use mobile devices such as mobile phones or tablets. Do we let users provide their own devices? Do we provide the devices for them? what is the best device for the job and demands for and from the user? All of these considerations and many more must come into play when introducing and upgrading devices in the enterprise environment. Policies must be able to protect the companies data as well as provide a solid user experience to use that data so users can produce favorably for a company. Protection and tracking of the data should also be easy to manage and implement and easy to change as mobile devices are constantly changing and can be easily lost or stolen.
One of the most important things I have learned while attending Vision 2011 has been that the landscape for protecting and managing an enterprise is contstantly evolving to adjust to the various demands and pressures that exist. This includes both the every changing dymanic security landscape, such as APT and organized hacking for profit as well as the ability to dynamically manage new endpoints that are joining the environment. The ability to anticipate and evaluate the adjustments needed are complex and need a toolset that can do the job.