For example, security of an endpointdevice becomes less of a risk management factor if data is protected and authorized users must authenticate their identities to gain access to it.
There is another school of thought, one championed initially by Microsoft, and by many others now, which says as much work as possible should be offloaded to the endpointdevice.