Mobile computing is ubiquitous, but security solutions for mobile workers are not. For mobile security to be effective, tools and policies often need to be customized for specific users, roles, departments; or technologies. IT should recognize the diversity of employee roles and requirements for mobile security. This white paper provides an overview of the key criteria for customizing a mobile security policy for your users; the variations in the use of mobile technology and the implications of mobile security; the implications for mobile content security;.”]

