The document discusses strategies for managing mobile devices in corporate environments. It notes that personal mobile device usage is increasing in workplaces. It then analyzes the security risks of centralized, decentralized, and open decentralized management architectures. The document advocates for an open decentralized approach that allows users to access corporate systems from any device but also implements security policies and education to balance user needs with risk management.