Site hosted by Build your free website today!
Abstract:  A free, on-demand Webcast recorded on June 23 2004


Despite spending millions of dollars to protect enterprises resources on laptop and desktop computers, the vast majority of enterprises are ignoring what will be one of the most dangerous threats to the security of sensitive corporate content.


Dismissing mobile phones and PDAs as limited function, consumer-oriented devices, most enterprise information technology support organizations have ignored the evolution of the mobile device over the past few years. With storage, application execution, and connectivity capabilities that approach that of laptop computers, mobile devices in the enterprise now routinely store sensitive corporate and personal data ranging from email attachments and contact lists to customer relationship databases and human resources information. Furthermore, these pocket-sized devices are often lost or stolen, particularly those deployed by enterprises and viewed as expendable by employees.