IT has spent lot of time and money in the last five years to secure mobile apps, considering technologies such as mobile application management servers, app wrapping, app containers, thin-client-style Web apps, and even mobile virtualization.But IT has spent very little effort on actual mobile apps. As a result, mobile devices continue to be largely user-driven, email-oriented devices that IT simultaneously fears for spurious security reasons and considers a poor substitute for a real PC. It doesn’t have to be this way.