The rapid adoption of the newest mobile devices -- especially the <a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a> <a href="https://www.networkworld.com/slideshows/2010/120101-iphone-quiz.html">iPhone</a> and <a href="http://www.networkworld.com/news/2010/111910-apple-ipad-resources.html">iPad</a> and the Google <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a>-based equivalents -- will be a huge disruptive force in enterprise <a href="http://www.networkworld.com/topics/security.html">security</a> next year. Not only will there be pressure to decide how to protect and manage these devices, which are growing as malware targets, the complexity of this task is magnified many times over because companies are allowing employees to use their own personal <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a> and tablets for business purposes -- what's sometime called "bring your own device" (BYOD).