Over the past one or two years, security professionals have attempted to raise awareness of the dangers associated with connecting smartphones, PDAs, iPods, and other devices to business network-connected endpoints. Some vendors stepped up and provided centrally managed methods of protecting information stored on company...
