Security professionals know that mobile computing means securing thousands of various devices as well as applications and content that resides on them. These mobile gizmos are often loaded with suspicious software for gaming, social networking, file synchronization/storage, etc. Many are owned by employees, not employers, which means the security team needs to walk on eggshells as they protect the confidentiality, integrity, and availability of organizational assets. ESG recently published a research report titled, The State of Mobile Computing Security, and asked 242 security professionals working at enterprise organizations.”]

