"Ideally, an IT manager will be able to remotely configure a multifunction device, load software on it, set policies governing passwords, implement encryption and wipe the device clean by remote control should it be lost or stolen.
Companies must also decide whether to forbid certain content—such as personally identifiable information—from ever residing on mobile devices, and then to enforce such policies.
It’s a tall order that a number of different vendors—including Research In Motion, Nokia, IBM Tivoli and Microsoft—are addressing to varying degrees."