The document is a white paper that discusses the mobile enterprise and security challenges it presents. It makes three key points:
1. The mobile enterprise blurs traditional network boundaries and security with diverse devices, cloud apps, and dynamic access locations. Effective security requires coordinated policies across business, IT, and security.
2. Existing security tools cannot adequately address the scale and complexity of the mobile enterprise. A new, integrated network/security architecture is needed for centralized management, distributed enforcement, comprehensive monitoring, and automation.
3. A strategic approach is required involving collaborative policy creation, the right infrastructure to support policies and enforcement, and ongoing monitoring to measure effectiveness and drive improvement. This creates a security lifecycle aligned with business