Leading organizations are aligning mobile security with all other IT activities software development, infrastructure, device management, etc. Neither group is tightly connected with the actual applications used by PC users. Mobile devices are not PCs, but when it comes to security, many organizations treat them as such. CISOs should get security people involved early with business process and application planning, author says. Vendors who appreciate this distinction and design their products accordingly have the best chance to succeed, he says. Mobile-focused vendors like Good Technology, MobileIron and Zenprise have established themselves as MDM and MAM leaders.”]

