Highly mobile users traversing multiple networks and computing devices with varying levels of trust and states require security to be effective while not inhibiting productivity. Endpoint exploit and malware detection and protection, data loss prevention, mobile device management, content filtering and encryption are just some of the many capabilities available at the computing host but for control measures to be of optimal value they must be relevant and in context with organizational objectives.