The information system implements host-based boundary protection mechanisms for servers, workstations, and mobile devices.