This is challenging because compliance matters today more than it did in the old days. Virus and worm attacks—and increasingly spyware—are more common now than ever and with the mobility of devices, the chance of infection is high as devices move to public networks and then back onto the corporate network. And because of the automated nature these attacks propagate through, the legitimate user represents as big a threat to the network as the bad guy who initiated the attack in the first place. This is because without these legitimate systems to aid in the propagation of the attack, the impact to the overall network is significantly reduced.