Innovative mobile security technology has been developed fight vulnerabilities. However using cutting-edge solutions may haunt IT execs. What are your views?