Endpoints are where data is created and where it is accessed from, so every endpoint connected to a network—whether it is a PC, a tablet, or a smartphone—is a point of vulnerability. With one compromised endpoint, an entire infrastructure can be compromised. The priority then is to get the endpoint protected and monitored by Capture Client.