In a perfect world, every endpoint is accounted for and kept under lock and key. No matter where they reside or who uses them or how much traffic they ferry in a corporate network on a given day, endpoints in this utopia are just as safe and secure as the most tightly guarded on-site data center.
Source: SC Magazine