Security tools are described that provide different security policies to
be enforced based on a location associated with a network environment in
which a mobile device is operating. Methods for detecting the location of
the mobile device are described. Additionally, the security tools may
also provide for enforcing different policies based on security features.
Examples of security features include the type of connection, wired or
wireless, over which data is being transferred, the operation of
anti-virus software, or the type of network adapter card.The different
security policies provide enforcement mechanisms that may be tailored
based upon the detected location and/or active security features
associated with the mobile device. Examples of enforcement mechanisms are
adaptive port blocking, file hiding and file encryption.