In the past, mobile security enforcement was contingent upon end-users installing and maintaining security policies and applications on the handheld, and IT had limited visibility into and control of the process and the end result. Good Mobile Defense closes the loop on mobile security. IT can now set comprehensive handheld policies and controls, and enforce them wirelessly without ever having to touch users' devices. |