Endpoints have become diverse over a period. With BYOD and IOT, the definition of what constitutes an endpoint is also changing. Enterprise customers need to look at threats (outside-in, inside-out) and device vulnerability in entirety. Enterprise endpoints continue to be the most vulnerable and often the last line of defense to prevent attacks. The ever-increasing footprint of point products to detect, protect and respond to cyber-attacks adds to the complexity of securing the enterprise. Each of the point products adds an agent to the endpoint and is often managed independent of the other security technologies present on that endpoint.
Managing these multiple endpoint technologies adds to the complexity of the environment. IT and security teams across organizations want ‘simple to deploy and use’, ‘easy to manage’ product that can work on heterogeneous environments and provide overall security.