An endpoint refers to any device outside the corporate firewall, including servers, workstations, smartphones, and tablets used to connect to the organization’s infrastructure. Endpoints represent vulnerable and lucrative points of entry for cybercriminals as they can be used to execute code and exploit vulnerabilities. With organizational workforces becoming more mobile and users connecting to internal resources from off-premise endpoints all over the world, endpoints are increasingly susceptible to attacks and need to be properly secured.