Today's mobile devices are becoming mini-computers, and they are vulnerable to similar types of threats that traditional PC encounter. Organizations and operators should consider security requirements for protecting their users' devices and the expanding network perimeter.