This document outlines steps for evaluating a mobile threat defense solution, including defining important requirements, success criteria, planning a trial, and validating findings. It recommends aggregating industry best practices, listing objectives to prioritize and score solutions, executing a 30-day trial on 5-20 devices to collect threat data and assess user experience, and talking to references to confirm the evaluation process and results. The goal is to thoroughly test solutions and choose one that protects against all mobile threat vectors and meets critical requirements.