If UNIStim does not like being NATted, I think OP's only option is to change VPN clients to one that supports "true" tunneling mode in IPsec. I read through the Shrew docs, and they are very light on details, but as far as I could tell, even though it supports "tunneling" mode, as far as Shrew goes, that only appears to mean that it is encrypting & signing the IP header along with the payload, and does not actually mean that you can use Shrew as a gateway for multiple IP devices on its end of the tunnel (presumably, though, this is not necessarily a Shrew limitation, but a Windows one).
The easiest answer is to get a different router on your end: one that supports IPsec tunnels. Then you'd let the router construct the VPN instead of a software client (Shrew) on your computer, and connect both your computer and the phone to that router. If you absolutely MUST have a software VPN client on your computer, I don't know of too many (other than Linux's native IP stack) that would allow you to do this. You'd need to have an IP networking stack in your OS that supports IP forwarding (basically, it needs to be able to act as a router) and an IPsec client that supports tunnel mode. One possible (but complicated and convoluted) solution would be to run something like VMware Player or VirtualBox (or some other virtualization layer) on your computer, and then run a router OS inside of that -- something like MikroTik RouterOS or Vyatta Core -- that you'd use in place of a native IPsec software client. I've actually done this before, and it works great and is much more flexible, but you may find it to be a challenge to set up and use, especially if you are not particularly well-versed in IP networking.
The IT/network admin at your company may also need to make additional changes on their VPN concentrator for this to work.
-- Nathan