The CIO's Guide to Mobile Security

Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data, including:
- Integrity of the corporate firewall
- Confidentiality, integrity and authenticity over the network
- Confidentiality of data on the devices
- Virus and other malware protection
- Supporting existing corporate security standards
- Establishing, enforcing and periodically updating security policies