The document discusses mobile security and provides recommendations for organizations. It covers the following key points:
1. Mobility has introduced new security risks as the traditional network perimeter is broken and devices are used outside an organization's control. This includes risks from lost devices, insecure networks, overlap of personal and work usage, and cloud data storage.
2. A layered mobile security strategy is recommended, with security controls embedded in policies, infrastructure, applications, and data. Organizations should define acceptable usage policies and deploy mobile device management to monitor compliance.
3. Application security is also important, with recommendations to use secure development practices, test apps for vulnerabilities, and encrypt sensitive data. A defense-in-depth approach combining