But that's what many enterprises do. They spend millions defending the perimeter, then allow laptops and other mobile devices to bypass those defenses. A whole host of threats—spyware, worms, bots, you name it—gets a free pass inside. And chaos ensues.
The solutions are endpoint protection and endpoint compliance (endpoint compliance is also known as network access control, or NAC). However, in implementing these solutions, watch for these pitfalls: