The protection of data on a client mobile computing device by a server
computer system such as within an enterprise network or on a separate
mobile computing device is described. Security tools are described that
provide different security policies to be enforced based on a location
associated with a network environment in which a mobile device is
operating. Methods for detecting the location of the mobile device are
described. Additionally, the security tools may also provide for
enforcing different policies based on security features. Examples of
security features include the type of connection, wired or wireless, over
which data is being transferred, the operation of anti-virus software, or
the type of network adapter card. The different security policies provide
enforcement mechanisms that may be tailored based upon the detected
location and/or active security features associated with the mobile
device. Examples of enforcement mechanisms are adaptive port blocking,
file hiding and file encryption.