and network-based security equipment – they all communicate with the network. These endpoints also need security, usually delivered in the shape of endpoint protection solutions. Various such ...