Most end-user computing strategies are carried out amid a complex mix of legacy systems and newer technologies. Organizations must balance their top priority (security) with the challenges IT faces in managing security for the growing array of endpoint devices preferred by employees. Cloud consumption models and newer security approaches hold promise for simplifying those responsibilities, cutting costs, and improving flexibility and service.