Identity and access - The management console allows the IT manager to set up user profiles to determine specific settings for each employee. Access permissions can be set for business critical applications, folders, and files to be saved, read, edited or emailed. These settings can be changed on the fly by the IT administrator.

“Organizations should also make sure their cellular carriers have security built in to their networks, including anti-malware and anti-spam software, hosted public key infrastructure (PKI) encryption, two-factor authentication support and fraud detection,” added Hedrich.

He recommends McAfee Enterprise Mobility Management and Symantec Mobile Management as the a couple of the better approaches to mobile device management and security.

For organizations that do not already have data loss prevention, he suggested Blue Coat, Cisco, McAfee, RSA, and Symantec as possible choices.

For content filtering, he said, organizations should also look at Blue Coat, Cisco, McAfee, Symantec and Websense, which all rank highly in Gartner assessments.

Drew Robb is a freelance writer based in Los Angeles specializing in technology and engineering. He has a degree in Geology/Geography from the University of Strathclyde in Scotland. He is the author of Server Disk Management in a Windows Environment, as well as hundreds of magazine articles.