This is pushed to the point where you could easily get the impression that it is necessary to throw your entire budget at this and nothing else. The difficult part when it comes to saying what constitutes endpoint security, however, is just how much it actually covers.
What is the endpoint?
There are two schools of thought when it comes to answering the question “What is the endpoint?” The classic answer to this question used to be your demarcation point (or demarc location): where your connection arrives at your facility. Fast forward to now, when watches, vehicles and toasters potentially have dedicated 4G connections while simultaneously attaching to Wi-Fi networks, and suddenly the classic answer is much more difficult to stand by.
So what is the endpoint? The effective answer is anything that connects to our network, but that only tells part of the story.
Let’s say for a moment that a single hypothetical user has been issued a workstation, laptop, mobile