Where does “it” end?
We can probably all agree that securing and protecting the devices that communicate with our networks is a fair definition of endpoint security. Similarly, these devices are one of the best places to start when figuring out how to secure your networks because they are a particular pain point for security teams, responsible for 70 percent of breaches and a source of daily headaches.
But within this traditional definition, what, really, is the endpoint of today? How we answer that question has significant security implications.