
1. Install on-device anti-malware to protect against malicious applications, spyware, infected SD cards and malware-based attacks to the device.

2. Use on-device firewall to protect device interfaces.

3. Utilize SSL VPN clients to protect data in transit and to ensure secure and appropriate network access and authorization.

4. Leverage a tool that allows you to administer centralized remote locate, track, lock, wipe, backup and restore facilities for lost and stolen devices.

5. Centralize administration of devices to enforce and report on security policies across the entire mobile device population.

6. Offer support for all major mobile platforms, including Google Android, RIM BlackBerry, Apple iOS, Microsoft Windows Mobile, and Nokia Symbian to ensure nothing falls through the cracks.

7. Monitor messaging and control of installed applications on devices.

8. Seek out a tool that integrates with network-based technologies, such as network access control (NAC), to ensure the security posture of mobile devices before allowing access to corporate resources.

9. Organizations will need management capabilities to enforce security policies, such as mandating the use of PINs/passcodes.

10. Seek out a solution that offers the ability for an administrator to monitor device activity for data leakage and inappropriate use.