Before that, therewas no real comprehensive mobile de-vice management outside of managingan organization???s desktops and laptops.Palm types of devices weren???t that man-ageable; you could enforce a passwordand wipe the device, but there was noremote management of access to e-mail,images and other data, or enterprise se-curity enforcement for the device.