Simply put, severely compromised host environments, the emergence of a mobile, socially networked world and cloud computing have created a set of security requirements that can only be met by solving the malicious host problem.
FORBES: Written by David Lowenstein and Risu Na