1) The document discusses bringing your own device (BYOD) trends in enterprises and outlines four steps to enabling secure BYOD networks.
2) It provides statistics on growing smartphone and tablet adoption and usage in businesses.
3) The four steps outlined to enable secure BYOD are: provide a safe, device-agnostic connection everywhere; deliver secure, consistent authentication, authorization and access; protect the user, their device and data and the network, apps and data; and simply manage the user, device, their apps and access.