iPhones, iPads, Androids, Windows Phones, and more are joining your business's suite of technology tools, driven by user demand and need. Most companies have opened up their networks to such devices, but big questions remain on how to do so securely, how to manage the new breed of devices to ensure compliance and information security while not unduly burdening users. This guide looks at all aspects of the issue, including the underlying consumerization trend,the role of policy-based management, device capabilities, and strategies for mobile device management (MDM) and mobile application management (MAM).